<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 17:59:15 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Gateway”</title>
    <link>https://www.bsdnow.tv/tags/gateway</link>
    <pubDate>Thu, 13 Jun 2024 12:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>563: 14.1</title>
  <link>https://www.bsdnow.tv/563</link>
  <guid isPermaLink="false">6f802912-a29d-4285-ac35-22bd8efcebeb</guid>
  <pubDate>Thu, 13 Jun 2024 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6f802912-a29d-4285-ac35-22bd8efcebeb.mp3" length="47132160" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 14.1-RELEASE Announcement, Automatic dark mode with OpenBSD and dwm, dhcp6leased(8) imported to -current, DHCPv6-PD - First steps by florian@, Replacing my OPNsense gateway hardware by a Protectli appliance, How to alter file owernship and permissions with a feedback information, and more</itunes:subtitle>
  <itunes:duration>49:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 14.1-RELEASE Announcement, Automatic dark mode with OpenBSD and dwm, dhcp6leased(8) imported to -current, DHCPv6-PD - First steps by florian@, Replacing my OPNsense gateway hardware by a Protectli appliance, How to alter file owernship and permissions with a feedback information, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD 14.1-RELEASE Announcement (https://www.freebsd.org/releases/14.1R/announce/)
News Roundup
Automatic dark mode with OpenBSD and dwm (https://plexwave.org/blog/auto-dark-mode)
dhcp6leased(8) imported to -current (https://www.undeadly.org/cgi?action=article;sid=20240604085042&amp;amp;utm_source=bsdweekly)
DHCPv6-PD - First steps by florian@ (http://undeadly.org/cgi?action=article;sid=20240606180535)
Replacing my OPNsense gateway hardware by a Protectli appliance (https://www.ncartron.org/replacing-my-opnsense-gateway-hardware-by-a-protectli-appliance.html)
How to alter file owernship and permissions with a feedback information (https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Sad News (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/563/feedback/sad_news.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, 14.1, announcement, automatic, dark-mode, dwm, dhcp6leased, DHCPv6-PD, OPNsense, gateway, Protectli, feedback, chown, chmod</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 14.1-RELEASE Announcement, Automatic dark mode with OpenBSD and dwm, dhcp6leased(8) imported to -current, DHCPv6-PD - First steps by florian@, Replacing my OPNsense gateway hardware by a Protectli appliance, How to alter file owernship and permissions with a feedback information, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/releases/14.1R/announce/" rel="nofollow">FreeBSD 14.1-RELEASE Announcement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://plexwave.org/blog/auto-dark-mode" rel="nofollow">Automatic dark mode with OpenBSD and dwm</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20240604085042&utm_source=bsdweekly" rel="nofollow">dhcp6leased(8) imported to -current</a></p>

<p><a href="http://undeadly.org/cgi?action=article;sid=20240606180535" rel="nofollow">DHCPv6-PD - First steps by florian@</a></p>

<hr>

<p><a href="https://www.ncartron.org/replacing-my-opnsense-gateway-hardware-by-a-protectli-appliance.html" rel="nofollow">Replacing my OPNsense gateway hardware by a Protectli appliance</a></p>

<hr>

<p><a href="https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/" rel="nofollow">How to alter file owernship and permissions with a feedback information</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/563/feedback/sad_news.md" rel="nofollow">Sad News</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 14.1-RELEASE Announcement, Automatic dark mode with OpenBSD and dwm, dhcp6leased(8) imported to -current, DHCPv6-PD - First steps by florian@, Replacing my OPNsense gateway hardware by a Protectli appliance, How to alter file owernship and permissions with a feedback information, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/releases/14.1R/announce/" rel="nofollow">FreeBSD 14.1-RELEASE Announcement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://plexwave.org/blog/auto-dark-mode" rel="nofollow">Automatic dark mode with OpenBSD and dwm</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20240604085042&utm_source=bsdweekly" rel="nofollow">dhcp6leased(8) imported to -current</a></p>

<p><a href="http://undeadly.org/cgi?action=article;sid=20240606180535" rel="nofollow">DHCPv6-PD - First steps by florian@</a></p>

<hr>

<p><a href="https://www.ncartron.org/replacing-my-opnsense-gateway-hardware-by-a-protectli-appliance.html" rel="nofollow">Replacing my OPNsense gateway hardware by a Protectli appliance</a></p>

<hr>

<p><a href="https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/" rel="nofollow">How to alter file owernship and permissions with a feedback information</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/563/feedback/sad_news.md" rel="nofollow">Sad News</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>102: May Contain ZFS</title>
  <link>https://www.bsdnow.tv/102</link>
  <guid isPermaLink="false">e0de53ca-3dcf-4df7-a556-faa52c7788a7</guid>
  <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0de53ca-3dcf-4df7-a556-faa52c7788a7.mp3" length="48985492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD on Olimex RT5350F-OLinuXino (https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino)
If you haven't heard of the RT5350F-OLinuXino-EVB, you're not alone (actually, we probably couldn't even remember the name if we did know about it)
It's a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM
This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment
In part two of the series (https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2), he talks about the GPIO and how you can configure it
Part three is still in the works, so check the site later on for further progress and info
***
The modern OpenBSD home router (https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html)
In a new series of blog posts, one guy takes you through the process of building an OpenBSD-based gateway (http://www.bsdnow.tv/tutorials/openbsd-router) for his home network
"It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst"
Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless
This guide also covers PPP and IPv6, in case you have those requirements
In a similar but unrelated series (http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html), another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge
He also has a separate post (http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html) for setting up an IPSEC VPN on the router
***
NetBSD at Open Source Conference 2015 Kansai (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html)
The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference
They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event
Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k
They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it
And what conference would be complete without an LED-powered towel
***
OpenSSH 7.0 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html)
The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code
SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled
The syntax for permitting root logins has been changed, and is now called "prohibit-password" instead of "without-password" (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now
If you're using an older configuration file, the "without-password" option still works, so no change is required
You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications
Various bug fixes and documentation improvements are also included
Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users
In the next release, even more deprecation is planned: RSA keys will be refused if they're under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***
Interview - Peter Toth - peter.toth198@gmail.com (mailto:peter.toth198@gmail.com) / @pannonp (https://twitter.com/pannonp)
Containment with iocage (https://github.com/iocage/iocage)
News Roundup
More c2k15 reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809105132)
A few more hackathon reports from c2k15 in Calgary are still slowly trickling in
Alexander Bluhm's up first, and he continued improving OpenBSD's regression test suite (this ensures that no changes accidentally break existing things)
He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging
Renato Westphal sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150811171006) of his very first hackathon
He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network
Philip Guenther also wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809165912), getting some very technical and low-level stuff done at the hackathon
His report opens with "First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking." - not exactly beginner stuff
There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***
FreeBSD jails, the hard way (https://clinta.github.io/freebsd-jails-the-hard-way)
As you learned from our interview this week, there's quite a selection of tools available to manage your jails
This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf
Unlike with iocage, ZFS isn't actually a requirement for this method
If you are using it, though, you can make use of snapshots for making template jails
***
OpenSSH hardware tokens (http://www.tancsa.com/mdtblog/?p=73)
We've talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client and server?
This blog post will show you how to use a hardware token as a second authentication factor, for the "something you know, something you have" security model
It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd
Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***
LibreSSL 2.2.2 released (http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt)
The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes
At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don't want in a crypto tool...) and much more
SSLv3 support was removed from the "openssl" command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it'll be removed completely
Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc
It'll be in 5.8 (due out earlier than usual) and it's in the FreeBSD ports tree as well
***
Feedback/Questions
James writes in (http://slexy.org/view/s216lrsVVd)
Stuart writes in (http://slexy.org/view/s20uGUHWLr)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jails, iocage, bhyve, containers, lxc, docker, ezjail, router, gateway, ipsec, vpn, libressl, authentication, uefi, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>101: I'll Fix Everything</title>
  <link>https://www.bsdnow.tv/101</link>
  <guid isPermaLink="false">b0fef23d-9748-4e29-9419-eb23bd948f84</guid>
  <pubDate>Wed, 05 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0fef23d-9748-4e29-9419-eb23bd948f84.mp3" length="67071892" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...</itunes:subtitle>
  <itunes:duration>1:33:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD, from distribution to project (http://www.tedunangst.com/flak/post/from-distribution-to-project)
Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through
It's the third part of his ongoing (http://www.openbsd.org/papers/pruning.html) series (http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less) of posts about OpenBSD removing large bits of code in favor of smaller replacements
In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)
After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported
When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed
In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons
More discussion on HN (https://news.ycombinator.com/item?id=9980373) and reddit (https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/)
***
Remote ZFS mirrors, the hard way (https://github.com/hughobrien/zfs-remote-mirror)
Backups to "the cloud" have become a hot topic in recent years, but most of them require trade-offs between convenience and security
You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren't without some compromise
As the author puts it: "We don't need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we'll-deletes, or any of the noise that comes with using someone else's infrastructure."
This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself
The end result is an automatic system for incremental backups that's backed (pun intended) by ZFS
If you're serious about keeping your important data safe and sound, you'll want to give this one a read - lots of detailed instructions
***
Various DragonFlyBSD updates (http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html)
The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree
Intel ValleyView graphics support was finally committed to the main repository
While on the topic of graphics, they've also issued a call for testing (http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html) for a DRM update (matching Linux 3.16's and including some more Broadwell fixes)
Their base GCC compiler is also now upgraded to version 5.2 (http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html)
If your hardware supports it, DragonFly will now use an accelerated console by default (http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html)
***
QuakeCon runs on OpenBSD (https://youtu.be/mOv62lBdlXU?t=292)
QuakeCon (https://en.wikipedia.org/wiki/QuakeCon), everyone's favorite event full of rocket launchers, recently gave a mini-tour of their network setup
For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF
In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more
He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution
There's also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff
Follow-up questions can be asked in this reddit thread (https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/)
The host doesn't seem to be that familiar with the topics at hand, mentioning "OpenPF" multiple times among other things, so our listeners should get a kick out of it
***
Interview - Adrian Chadd - adrian@freebsd.org (mailto:adrian@freebsd.org) / @erikarn (https://twitter.com/erikarn)
Rethinking ways to improve FreeBSD (https://www.reddit.com/r/freebsd/comments/3d80vt)
News Roundup
CII contributes to OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20150804161939)
If you recall back to when we talked to the OpenBSD foundation (http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2), one of the things Ken mentioned was the Core Infrastructure Initiative (https://www.coreinfrastructure.org)
In a nutshell (https://www.coreinfrastructure.org/faq), it's an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet
The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) 
To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they've just made a large donation to the foundation - this makes them the first (http://www.openbsdfoundation.org/contributors.html) "platinum" level donor as well
While the exact amount wasn't disclosed, it was somewhere between $50,000 and $100,000
The donation comes less than a month after Microsoft's big donation (http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520), so it's good to see these large organizations helping out important open source projects that we depend on every day
***
Another BSDCan report (http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html)
The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon
In his report, he mainly covers the devsummit and some discussion with the portmgr team
One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well
He also gives his thoughts on using QEMU for cross-compiling packages (http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu) and network performance testing
***
Lumina 0.8.6 released (http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/)
The PC-BSD team has released another version of Lumina (http://www.lumina-desktop.org/), their BSD-licensed desktop environment
This is mainly a bugfix and performance improvement release, rather than one with lots of new features
The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)
Lots of non-English translation updates and assorted fixes are included as well
If you haven't given it a try yet, or maybe you're looking for a new window manager, Lumina runs on all the BSDs
***
More c2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150730180506)
Even more reports from OpenBSD's latest hackathon are starting to pour in
The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)
He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD
Second up is Andrew Fresh (http://undeadly.org/cgi?action=article&amp;amp;sid=20150731191156&amp;amp;mode=flat), who went without any specific plans, but still ended up getting some UTF8 work done
On the topic of ARMv7, "I did enjoy being there when things weren't working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn't much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon."
Florian Obser sent in a report that includes a little bit of everything (http://undeadly.org/cgi?action=article&amp;amp;sid=20150805151453): setting up the hackathon's network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food
Paul Irofti wrote in as well (http://undeadly.org/cgi?action=article&amp;amp;sid=20150801100002&amp;amp;mode=flat) about his activities, which were mainly focused on the Octeon CPU architecture
He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification
This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***
Feedback/Questions
Hamza writes in (http://slexy.org/view/s205kqTEIj)
Florian writes in (http://slexy.org/view/s2ogIP6cEf)
Dominik writes in (http://slexy.org/view/s214xE9ulK)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, quakecon, pf, firewall, gateway, server, reddit, c2k15, hackathon, octeon, zfs, backups, offsite, valleyview, bsdcan, cii</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>88: Below the Clouds</title>
  <link>https://www.bsdnow.tv/88</link>
  <guid isPermaLink="false">26ef6d0e-ea2a-4032-88ee-121e1b2be033</guid>
  <pubDate>Wed, 06 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/26ef6d0e-ea2a-4032-88ee-121e1b2be033.mp3" length="67680724" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:34:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2015-01-2015-03.html)
The FreeBSD team has posted a report of the activities that went on between January and March of this year
As usual, it's broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)
The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter
The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward
FreeBSD's future release support model was also finalized and published in February, which should be a big improvement for both users and the release team
Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code
Lots of activity is happening in bhyve, some of which we've covered recently (http://www.bsdnow.tv/episodes/2015_04_29-on_the_list), and a number of improvements were made this quarter
Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT
Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being
The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already
ASLR work (http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover) is still being done by the HardenedBSD guys, and their next aim is position-independent executable
The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more
Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***
OpenBSD 5.7 released (http://www.openbsd.org/57.html)
OpenBSD has formally released another new version, complete with the giant changelog we've come to expect
In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs
If you're using one of the Soekris boards, there's even a new driver (http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/) to manipulate the GPIO and LEDs on them - this has some fun possibilities
Some new security improvements include: SipHash (https://en.wikipedia.org/wiki/SipHash) being sprinkled in some areas to protect hashing functions, big W^X improvements (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2) in the kernel space, static PIE (http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky) on all architectures, deterministic "random" functions being replaced (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2) with strong randomness, and support for remote logging over TLS
The entire source tree has also been audited to use reallocarray (http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/), which unintentionally saved (https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c) OpenBSD's libc from being vulnerable to earlier attacks (https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/) affecting other BSDs' implementations
Being that it's OpenBSD, a number of things have also been removed from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)
Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily
BIND and nginx have been taken out, so you'll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon
Speaking of httpd, it's gotten a number of new (http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf) features (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5), and has had time to grow and mature since its initial debut - if you've been considering trying it out, now would be a great time to do so
This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man)
Check the errata page (http://www.openbsd.org/errata57.html) for any post-release fixes, and the upgrade guide (http://www.openbsd.org/faq/upgrade57.html) for specific instructions on updating from 5.6
Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases
There's a song and artwork (http://www.openbsd.org/lyrics.html#57) to go along with the release as always, and CDs should be arriving within a few days - we'll show some pictures next week
Consider picking one up (https://www.openbsdstore.com) to support the project (and it's the only way to get puffy stickers)
For those of you paying close attention, the banner image (http://www.openbsd.org/images/puffy57.gif) for this release just might remind you of a certain special episode (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) of BSD Now...
***
Tor-BSD diversity project (https://torbsd.github.io/)
We've talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)
A new initiative has started to do just that, called the Tor-BSD diversity project
"Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity."
In addition to encouraging people to put up more relays, they're also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy
There's an additional progress report (http://trac.haqistan.net/blog/tor-browser-ports-progress) for that part specifically, and it looks like most of the work is done now
Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list 
If you've been considering running a node to help out, there's always our handy tutorial (http://www.bsdnow.tv/tutorials/tor) on getting set up
***
PC-BSD 10.1.2-RC1 released (http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/)
If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab
This quarterly update includes a number of new features, improvements and even some additional utilities
PersonaCrypt is one of them - it's a new tool for easily migrating encrypted home directories between systems
A new "stealth mode" option allows for a one-time login, using a blank home directory that gets wiped after use
Similarly, a new "Tor mode" allows for easy tunneling of all your traffic through the Tor network
IPFW is now the default firewall, offering improved VIMAGE capabilities
The life preserver backup tool now allows for bare-metal restores via the install CD
ISC's NTP daemon has been replaced with OpenNTPD (http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change), and OpenSSL has been replaced with LibreSSL (http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild)
It also includes the latest Lumina (http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment) desktop, and there's another post dedicated to that (http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/)
Binary packages have also been updated to fresh versions from the ports tree
More details, including upgrade instructions, can be found in the linked blog post
***
Interview - Ed Schouten - ed@freebsd.org (mailto:ed@freebsd.org) / @edschouten (https://twitter.com/edschouten)
CloudABI (https://www.bsdcan.org/2015/schedule/track/Security/524.en.html)
News Roundup
Open Household Router Contraption (http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/)
This article introduces OpenHRC, the "Open Household Router Contraption"
In short, it's a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device
It also makes use of Ansible playbooks for configuration, allowing for a more "mass deployment" type of setup
Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation
All the code is open source and on Github (https://github.com/ioc32/openhrc), so you can read through what's actually being changed and put in place
There's also a video guide (https://www.youtube.com/watch?v=LZeKDM5jc90) to the entire process, if you're more of a visual person
***
OPNsense 15.1.10 released (https://forum.opnsense.org/index.php?topic=365.0)
Speaking of BSD routers, if you're looking for a "prebuilt and ready to go" option, OPNsense has just released a new version
15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code
Going along with this theme, they've redone how they do ports, and are now kept totally in sync with the regular ports tree
Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed
NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well
Version 15.1.10.1 (https://twitter.com/opnsense/status/596009164746432512) was released shortly thereafter, including a hotfix for VLANs
***
IBM Workpad Z50 and NetBSD (https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en)
Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same
Back in 1999, they released the Workpad Z50 (http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/) with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display
You can probably tell where this is going... the article is about installing NetBSD it
"What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running"
The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern
He's also got a couple (https://www.youtube.com/watch?v=hSLVnSZKB9I) videos (https://www.youtube.com/watch?v=mIA-NWEHLM4) of the bootup process and running Xorg (neither of which we'd call "speedy" by any stretch of the imagination)
***
FreeBSD from the trenches (http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html)
The FreeBSD foundation has a new blog post up in their "from the trenches" series, detailing FreeBSD in some real-world use cases
In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI
While the installer allows for an automatic ZFS layout, Glen notes that it's not a one-size-fits-all thing, and goes through doing everything manually
Each command is explained, and he walks you through the process of doing an encrypted installation (http://www.bsdnow.tv/tutorials/fde) on your root zpool
***
Broadwell in DragonFly (http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html)
DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver
Their i915 driver has been brought up to speed with Linux 3.14's, adding not only Broadwell support, but many other bugfixes for other cards too
It's planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s216QQcHyX)
Hunter writes in (http://slexy.org/view/s21hGSk3c0)
Hrishi writes in (http://slexy.org/view/s20JwPw9Je)
Clint writes in (http://slexy.org/view/s2x1GYr7y6)
Sergei writes in (http://slexy.org/view/s2swXxr2PX)
***
Mailing List Gold
How did you guess (https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, 5.7, libressl, opensmtpd, openntpd, openssh, cloudabi, capsicum, 5.7, tor-bsd, tor, diversity, browser bundle, ipfw, openhrc, opnsense, router, workpad z50, gateway</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>81: Puffy in a Box</title>
  <link>https://www.bsdnow.tv/81</link>
  <guid isPermaLink="false">a8a11e67-acad-44db-b8d9-840c53f401f9</guid>
  <pubDate>Wed, 18 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a8a11e67-acad-44db-b8d9-840c53f401f9.mp3" length="62032180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Using OpenBGPD to distribute pf table updates (http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers)
For those not familiar, OpenBGPD (https://en.wikipedia.org/wiki/OpenBGPD) is a daemon for the Border Gateway Protocol (https://en.wikipedia.org/wiki/Border_Gateway_Protocol) - a way for routers on the internet to discover and exchange routes to different addresses
This post, inspired by a talk about using BGP to distribute spam lists (https://www.youtube.com/watch?v=Vet0eQB00X0), details how to use the protocol to distribute some other useful lists and information
It begins with "One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems."
If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files
OpenBGPD is part of the OpenBSD base system, but there's also an unofficial port to FreeBSD (https://www.freshports.org/net/openbgpd/) and a "work in progress" pkgsrc version (http://pkgsrc.se/wip/openbgpd)
***
Mounting removable media with autofs (http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html)
The FreeBSD foundation has a new article in the "FreeBSD from the trenches" series, this time about the sponsored autofs (https://www.freebsd.org/cgi/man.cgi?query=autofs&amp;amp;sektion=5) tool
It's written by one of the autofs developers, and he details his work on creating and using the utility
"The purpose of autofs(5) is to mount filesystems on access, in a way that's transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes."
He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives
It ends with a real-world example of something we're all probably familiar with: plugging in USB drives and watching the magic happen
There's also some more advanced bonus material on GEOM classes and all the more technical details
***
The Tor Browser on BSD (http://trac.haqistan.net/blog/adventures-ports-tor-browser)
The Tor Project has provided a "browser bundle (https://www.torproject.org/projects/torbrowser/design/)" for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source
Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost 
It has, however, only been released for Windows, OS X and Linux - no BSD version
"[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves."
Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started
If you've got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***
OpenSSH 6.8 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html)
Continuing their "tick tock" pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it's a major upgrade, focused on new features (we like those better of course)
Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability
This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints
Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys
You can now require multiple, different public keys to be verified for a user to authenticate (useful if you're extra paranoid or don't have 100% confidence in any single key type)
The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon
Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***
NetBSD at AsiaBSDCon (https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html)
The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you'd expect
It covers their BoF session, the six NetBSD-related presentations and finally their "work in progress" session
There was a grand total of 34 different NetBSD gadgets (https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0) on display at the event
***
Interview - Lawrence Teo - lteo@openbsd.org (mailto:lteo@openbsd.org) / @lteo (https://twitter.com/lteo)
OpenBSD at Calyptix (http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf)
News Roundup
HardenedBSD introduces Integriforce (http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce)
A little bit of background on this one first: NetBSD has something called veriexec (https://www.netbsd.org/docs/guide/en/chap-veriexec.html), used for checking file integrity (http://wiki.netbsd.org/guide/veriexec/) at the kernel level
By doing it at the kernel level, similar to securelevels (https://en.wikipedia.org/wiki/Securelevel), it offers some level of protection even when the root account is compromised
HardenedBSD has introduced a similar mechanism into their "secadm" utility
You can list binaries in the config file that you want to be protected from changes, then specify whether those can't be run (http://i.imgur.com/wHp2eAN.png) at all, or if they just print a warning
They're looking for some more extensive testing of this new feature
***
More s2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150305100712&amp;amp;mode=flat)
A couple more Australian hackathon reports have poured in since the last time
The first comes from Jonathan Gray, who's done a lot of graphics-related work in OpenBSD recently
He worked on getting some newer "Southern Islands" and "Graphics Core Next" AMD GPUs working, as well as some OpenGL and DRM-related things
Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man)
Ted Unangst also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150307165135&amp;amp;mode=flat) to detail what he hacked on at the event
With a strong focus on improving SMP scalability, he tackled the virtual memory layer
His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8
All the trip reports are much more detailed than our short summaries, so give them a read if you're interested in all the technicalities
***
DragonFly 4.0.4 and IPFW3 (https://www.dragonflydigest.com/2015/03/10/15733.html)
DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4
It includes a minor list of fixes (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html), some of which include a HAMMER FS history fix, removing the no-longer-needed "new xorg" and "with kms" variables and a few LAGG fixes
There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version
Shortly after it was released, their new IPFW2 firewall was added to the tree (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html) and subsequently renamed to IPFW3 (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html) (since it's technically the third revision)
***
NetBSD gets Raspberry Pi 2 support (https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added)
NetBSD has announced initial support for the second revision (http://www.raspberrypi.org/products/raspberry-pi-2-model-b/) of the ever-popular Raspberry Pi board
There are -current snapshots available for download, and multiprocessor support is also on the way
The NetBSD wiki page about the Raspberry Pi also has some more information (https://wiki.netbsd.org/ports/evbarm/raspberry_pi/) and an installation guide
The usual Hacker News discussion (https://news.ycombinator.com/item?id=9172100) on the subject
If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***
OpenIKED as a VPN gateway (http://puffysecurity.com/wiki/openikedoffshore.html)
In our first discussion segment, we talked about a few different ways to tunnel your traffic
While we've done full tutorials on things like SSH tunnels (http://www.bsdnow.tv/tutorials/stunnel), OpenVPN (http://www.bsdnow.tv/tutorials/openvpn) and Tor (http://www.bsdnow.tv/tutorials/tor), we haven't talked a whole lot about OpenBSD's IPSEC suite
This article should help fill that gap - it walks you through the complete IKED setup
From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide's got it all
***
Feedback/Questions
Gary writes in (http://slexy.org/view/s21G9TWALE)
Robert writes in (http://slexy.org/view/s206aZrxOi)
Joris writes in (http://slexy.org/view/s28Um5R7LG)
Mike writes in (http://slexy.org/view/s2yAJsl1Es)
Anders writes in (http://slexy.org/view/s21dMAE55M)
***
Mailing List Gold
Can you hear me now (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142577632205484&amp;amp;w=2)
He must be GNU here (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html)
I've seen some... (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142593175408756&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, calyptix, router, gateway, pfsense, opnsense, smb, asiabsdcon, 2015, openbgpd, openiked, hardenedbsd, tor, vpn, autofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>72: Common *Sense Approach</title>
  <link>https://www.bsdnow.tv/72</link>
  <guid isPermaLink="false">efe89103-4a81-4974-89f3-cb650975dace</guid>
  <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/efe89103-4a81-4974-89f3-cb650975dace.mp3" length="57654580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Be your own VPN provider with OpenBSD (http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html)
We've covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don't trust any VPN company?
It's easy for anyone to say "of course we don't run a modified version of OpenVPN that logs all your traffic... what are you talking about?"
The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk
With this guide, you'll be able to cut out the middleman and create your own VPN, using OpenBSD
It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***
FreeBSD vs Gentoo comparison (http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/)
People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software
This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems
The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things
If you're a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***
Kernel W^X in OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2)
W^X, "Write XOR Execute (https://en.wikipedia.org/wiki/W%5EX)," is a security feature of OpenBSD with a rather strange-looking name
It's meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time
This helps prevent some types of buffer overflows: code injected into it won't execute, but will crash the program (quite obviously the lesser of the two evils)
Through some recent work, OpenBSD's kernel now has no part of the address space without this feature - whereas it was only enabled in the userland previously (http://www.openbsd.org/papers/ru13-deraadt/)
Doing this incorrectly in the kernel could lead to far worse consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that's been in the works for a while
More technical details can be found in some recent CVS commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141917924602780&amp;amp;w=2)
***
Building an IPFW-based router (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/)
We've covered building routers with PF (http://www.bsdnow.tv/tutorials/openbsd-router) many times before, but what about IPFW (https://www.freebsd.org/doc/handbook/firewalls-ipfw.html)?
A certain host of a certain podcast decided it was finally time to replace his disappointing (https://github.com/jduck/asus-cmd) consumer router with something BSD-based
In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall
He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit
If you're an IPFW fan and are thinking about putting together a new router, give this post a read
***
Interview - Jos Schellevis - project@opnsense.org (mailto:project@opnsense.org) / @opnsense (https://twitter.com/opnsense)
The birth of OPNsense (http://opnsense.org)
News Roundup
On profiling HTTP (http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html)
Adrian Chadd, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan), has been doing some more ultra-high performance testing
Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools
According to him, it's "not very pretty"
He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process
You can check out his new code on Github (https://github.com/erikarn/libevhtp-http/) right now
***
Using divert(4) to reduce attacks (http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&amp;amp;t=8846)
We talked about using divert(4) (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4) with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)
It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you're running
PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won't work
The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious
Consider setting this up to reduce the attack spam in your logs if you run public services
***
ChaCha20 patchset for GELI (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html)
A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the disk encryption (http://www.bsdnow.tv/tutorials/fde) system
There are also some benchmarks that look pretty good in terms of performance
Currently, GELI defaults to AES in XTS mode (https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29) with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)
There's some discussion (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html) going on about whether a stream cipher (https://en.wikipedia.org/wiki/Stream_cipher) is suitable or not (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html) for disk encryption though, so this might not be a match made in heaven just yet
***
PCBSD update system enhancements (http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/)
The PCBSD update utility has gotten an update itself, now supporting automatic upgrades
You can choose what parts of your system you want to let it automatically handle (packages, security updates)
The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality
There's also a new graphical frontend available for it
***
Feedback/Questions
Mat writes in (http://slexy.org/view/s2XJhAsffU)
Chris writes in (http://slexy.org/view/s20qnSHujZ)
Andy writes in (http://slexy.org/view/s21O0MShqi)
Beau writes in (http://slexy.org/view/s2LutVQOXN) 
Kutay writes in (http://slexy.org/view/s21Esexdrc)
***
Mailing List Gold
Wait, a real one? (https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html)
What's that glowing... (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142125454022458&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, opnsense, pfsense, m0n0wall, firewall, gateway, router, php, fork, deciso, netgate, portage, owncloud, soekris, apu, pcengines, alix, vpn, ipfw</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>60: Don't Buy a Router</title>
  <link>https://www.bsdnow.tv/60</link>
  <guid isPermaLink="false">e61941d1-74ff-40d0-91f6-86ff864cf99b</guid>
  <pubDate>Wed, 22 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e61941d1-74ff-40d0-91f6-86ff864cf99b.mp3" length="49443412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD Devroom CFP (https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html)
This year's FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom
They've issued a call for papers on anything BSD-related, and we always love more presentations
If you're in the Belgium area or plan on going, submit a talk about something cool you're doing
There's also a mailing list (https://lists.fosdem.org/listinfo/bsd-devroom) and some more information in the original post
***
Bhyve SVM code merge (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html)
The bhyve_svm code has been in the "projects" tree of FreeBSD, but is now ready (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273375) for -CURRENT
This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only
All the supported operating systems and utilities should work on both now
One thing to note: bhyve doesn't support PCI passthrough on AMD just yet
There may still be some issues (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html) though
***
NetBSD at Open Source Conference Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html)
The Japanese NetBSD users group held a booth at another recent open source conference
As always, they were running NetBSD on everything you can imagine
One of the users reports back to the mailing list on their experience, providing lots of pictures and links
Here's an interesting screenshot of NetBSD running various other BSDs in Xen (https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large)
***
More BSD switchers every day (https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/)
A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community
Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect
So far, he's found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion
There's also another semi-related thread (https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/) about another Linux user wanting to switch to BSD because of systemd and GNU people
There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read
Maybe the OPs should've just watched this show
***
Interview - Olivier Cochard-Labbé - olivier@cochard.me (mailto:olivier@cochard.me) / @ocochardlabbe (https://twitter.com/ocochardlabbe)
The BSD Router Project
News Roundup
FreeBSD -CURRENT on a T420 (https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420)
Thinkpads are quite popular with BSD developers and users
Most of the hardware seems to be supported across the BSDs (especially wifi)
This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI
If you've got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***
FreeNAS on a Supermicro 5018A-MHN4 (https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/)
More and more people are migrating their NAS devices to BSD-based solutions
In this post, the author goes through setting up FreeNAS on some of his new hardware
His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor
The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***
Hardening procfs and linprocfs (http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs)
There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux
There exists a native procfs in FreeBSD, which was the target point of that exploit, but it's not used very often
The Linux emulation layer also supports its own linprocfs, which was affected as well
The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs
If you want to learn more about ASLR and HardenedBSD, be sure to check out our interview with Shawn (http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover) too
***
pfSense monitoring with bandwidthd (http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/)
A lot of people run pfSense on their home network, and it's really useful to monitor the bandwidth usage
This article will walk you through setting up bandwidthd to do exactly that
bandwidthd monitors based on the IP address, rather than per-interface
It can also build some cool HTML graphs, and we love those pfSense graphs
Have a look at our bandwidth monitoring and testing (http://www.bsdnow.tv/tutorials/vnstat-iperf) tutorial for some more ideas
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s2b5ZZ5qCv)
Chris writes in (http://slexy.org/view/s20aVvhv2d)
Zeke writes in (http://slexy.org/view/s2Vmwxy1QM)
Bostjan writes in (http://slexy.org/view/s2LB6MKoNT)
Patrick writes in (http://slexy.org/view/s2xxB9uOuV)
***
Mailing List Gold
More (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141357595922692&amp;amp;w=2) old bugs (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141358124924479&amp;amp;w=2)
The Right Font™ (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141332534304117&amp;amp;w=2) (see also (https://twitter.com/blakkheim/status/522162864409546753))
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdrp, bsd router project, freenas, nas4free, router, gateway, firewall, pfsense, nanobsd, hardenedbsd, bhyve, devroom, fosdem</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>39: The Friendly Sandbox</title>
  <link>https://www.bsdnow.tv/39</link>
  <guid isPermaLink="false">4ae1b0f5-7c6f-486f-bdcf-c71ec415269c</guid>
  <pubDate>Wed, 28 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ae1b0f5-7c6f-486f-bdcf-c71ec415269c.mp3" length="45004756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:02:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2014 talks and reports (https://www.bsdcan.org/2014/schedule/)
The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links
Karl Lehenbauer's keynote (https://www.youtube.com/watch?v=13LiyjnTGsQ) (he's on next week's episode)
Mariusz Zaborski and Pawel Jakub Dawidek,
Capsicum and Casper (https://www.youtube.com/watch?v=0la06FHbdvg) (relevant to today's interview)
Luigi Rizzo,
In-kernel OpenvSwitch on FreeBSD (https://www.youtube.com/watch?v=Lr5o1VQMtgA)
Dwayne Hart, Migrating from Linux to FreeBSD for Backend Data Storage (https://www.youtube.com/watch?v=AVuF9eFeVWs)
Warner Losh, NAND Flash and FreeBSD (https://www.youtube.com/watch?v=lj0XAE6C6-k)
Simon Gerraty, FreeBSD bmake and Meta Mode (https://www.youtube.com/watch?v=4s0UY0sg6vI)
Bob Beck, LibreSSL - The First 30 Days (https://www.youtube.com/watch?v=oM6S7FEUfkU)
Henning Brauer, OpenBGPD Turns 10 Years Old (https://www.youtube.com/watch?v=cP8AW111IKg)
Arun Thomas, BSD ARM Kernel Internals (https://www.youtube.com/watch?v=ZAM7fqhGRr8)
Peter Hessler, Using BGP for Realtime Spam Lists (https://www.youtube.com/watch?v=i8UAVswpagA)
Pedro Giffuni, Features and Status of FreeBSD's Ext2 Implementation
 (https://www.youtube.com/watch?v=HMeTxViulgo)
Matt Ahrens, OpenZFS Upcoming Features and Performance Enhancements (https://www.youtube.com/watch?v=EjGqVdCOIhM)
Daichi Goto, Shellscripts and Commands (https://www.youtube.com/watch?v=MsRu0xIawaA)
Benno Rice, Keeping Current (https://www.youtube.com/watch?v=jZp-ciB6mAg)
Sean Bruno, MIPS Router Hacking (https://www.youtube.com/watch?v=LZjoFSfIv3k)
John-Mark Gurney, Optimizing GELI Performance (https://www.youtube.com/watch?v=2qicD0tv_tI)
Patrick Kelsey, Userspace Networking with libuinet (https://www.youtube.com/watch?v=LhIx8q8_7YY)
Massimiliano Stucchi, IPv6 Transitioning Mechanisms (https://www.youtube.com/watch?v=WZoQzUZKaeo)
Roger Pau Monné, Taking the Red Pill (https://www.youtube.com/watch?v=q6l9qtjlNXU)
Shawn Webb, Introducing ASLR in FreeBSD (https://www.youtube.com/watch?v=jo8ObzR1tKQ)
There's also a trip report (http://undeadly.org/cgi?action=article&amp;amp;sid=20140519164127) from Peter Hessler and one from Julio Merino (http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html)
The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that's a recurring trend)
***
Defend your network and privacy with a VPN and OpenBSD (http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html)
After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back
This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities
There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used
You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)
It also includes a few general privacy tips, recommended browser extensions, etc
The intro to the article is especially great, so give the whole thing a read
He mentions our OpenBSD router guide (http://www.bsdnow.tv/tutorials/openbsd-router) and other tutorials being a big help for this setup, so hello if you're watching!
***
You should try FreeBSD (http://blog.pascalj.com/article/you-should-try-freebsd/)
In this blog post, the author talks a bit about how some Linux people aren't familiar with the BSDs and how we can take steps to change that
He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two
Possibly the most useful part is how to address the question "my server already works, why bother switching?"
"Stackoverflow’s answers assume I have apt-get installed"
It includes mention of the great documentation, stability, ports, improved security and much more
A takeaway quote for would-be Linux switchers: "I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before"
***
OpenBSD and the little Mauritian contributor (http://hacklog.in/openbsd-and-the-little-mauritian-contributor/)
This is a story about a guy from Mauritius (https://en.wikipedia.org/wiki/Mauritius) named Logan, one of OpenBSD's newest developers
Back in 2010, he started sending in patched for OpenBSD's "mg" editor, among other small things, and eventually added file transfer resume support for SFTP
The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon
It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem
Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***
Interview - Jon Anderson - jonathan@freebsd.org (mailto:jonathan@freebsd.org)
Capsicum and Casperd
Tutorial
Encrypting DNS lookups (http://www.bsdnow.tv/tutorials/dnscrypt)
News Roundup
FreeBSD Journal, May 2014 issue (http://i.imgur.com/f0qg6Ss.jpg)
The newest issue of the FreeBSD Journal (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) is out, following the bi-monthly release cycle
This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling
Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***
LibreSSL porting update (http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html)
Since the last LibreSSL post we covered, a couple unofficial "portable" versions have died off
Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!
This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example
Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***
BSDMag May 2014 issue is out (http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue)
The usual monthly release from BSDMag, covering a variety of subjects
This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things
It's a free PDF, go grab it
***
BSDTalk episode 241 (http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html)
A new episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, this time with Bob Beck
He talks about the OpenBSD foundation's recent activities, his own work in the project, some stories about the hardware in Theo's basement and a lot more
The interview itself isn't about LibreSSL at all, but they do touch on it a bit too
Really interesting stuff, covers a lot of different topics in a short amount of time
***
Feedback/Questions
We got a number of replies about last week's VPN question, so thanks to everyone who sent in an email about it - the vpnc (https://www.freshports.org/security/vpnc/) package seems to be what we were looking for
Tim writes in (http://slexy.org/view/s20MK7bTyc)
AJ writes in (http://slexy.org/view/s2OWREQdUA)
Peter writes in (http://slexy.org/view/s202obAqbT)
Thomas writes in (http://slexy.org/view/s21Kye2jAc)
Martin writes in (http://slexy.org/view/s2zqFVqwxN)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, casper, casperd, the friendly ghost, capsicum, sandbox, application, jails, isolation, isolated, chroot, virtual machine, exploit, vpn, security, ssh, tunnel, encryption, bsdcan, presentation, talk, video, recordings, dnscrypt, opendns, dnscurve, lookups, dns, dnssec, gateway, vpn, vps, journal, bsdmag, bsdtalk, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
EuroBSDCon and AsiaBSDCon (http://2014.eurobsdcon.org/calendar/call-for-papers/)
This year, EuroBSDCon will be in September in Sofia, Bulgaria
They've got a call for papers up now, so everyone can submit the talks they want to present
There will also be a tutorial section of the conference
AsiaBSDCon (http://2014.asiabsdcon.org/timetable.html.en) will be next month, in March!
All the info about the registration, tutorials, hotels, timetable and location have been posted
Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***
FreeBSD 10 on Ubiquiti EdgeRouter Lite (http://rtfm.net/FreeBSD/ERL/)
The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU
This article goes through the process of installing and configuring FreeBSD on it to use as a home router
Lots of good pictures of the hardware and specific details needed to get you set up
It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else
For such a cheap price, might be a really fun weekend project to replace your shitty consumer router
Of course if you're more of an OpenBSD guy, you can always see our tutorial (http://www.bsdnow.tv/tutorials/openbsd-router) for that too
***
Signed pkgsrc package guide (http://blog.saveosx.org/signed-packages/)
We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up
It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)
He goes through the process of signing packages with a public key and how to verify the packages when you install them
The author also happens to be an EdgeBSD developer
***
Big batch of OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627)
Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI
In the second (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843), ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things
In the third (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808), jsg updated libdrm and mesa and did various work on xenocara
In the fourth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023), dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done
In the fifth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039), claudio talks about some stuff he did for routing tables and misc. other things
***
Interview - Chris Buechler - cmb@pfsense.com (mailto:cmb@pfsense.com) / @cbuechler (https://twitter.com/cbuechler)
pfSense
Tutorial
pfSense walkthrough
News Roundup
FreeBSD challenge continues (http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/)
Our buddy from the Linux foundation continues his switching to BSD journey
In day 13, he covers some tips for new users, mentions trying things out in a VM first
In day 14 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/), he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go
In day 15 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/), he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch
In day 16 (http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/), he dives into the world of FreeBSD jails (http://www.bsdnow.tv/tutorials/jails)!
***
BSD books in 2014 (http://blather.michaelwlucas.com/archives/1962)
BSD books are some of the highest quality technical writings available, and MWL has written a good number of them
In this post, he details some of his plans for 2014
In includes at least one OpenBSD book, at least one FreeBSD book and...
Very strong possibility of Absolute FreeBSD 3rd edition (watch our interview with him (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop))
Check the link for all the details
***
How to build FreeBSD/EC2 images (http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html)
Our friend Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten) details how to build EC2 images in a new blog post
Most people just use the images he makes on their instances, but some people will want to make their own from scratch (https://svnweb.freebsd.org/base/user/cperciva/EC2-build/)
You build a regular disk image and then turn it into an AMI
It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/)
This time around we discuss how you can become a developer
Kris also details the length of supported releases
Expect lots of new features in 10.1
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s216xJoCVG)
Jake writes in (http://slexy.org/view/s2gLrR3VVf)
Niclas writes in (http://slexy.org/view/s21gfG3Iho)
Steffan writes in (http://slexy.org/view/s2JNyw5BCn)
Antonio writes in (http://slexy.org/view/s2kg3zoRfm)
Chris writes in (http://slexy.org/view/s2ZwSIfRjm)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>11: The Gateway Drug</title>
  <link>https://www.bsdnow.tv/11</link>
  <guid isPermaLink="false">43438bdb-8de0-4237-81e2-da2f448be5ef</guid>
  <pubDate>Wed, 13 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/43438bdb-8de0-4237-81e2-da2f448be5ef.mp3" length="78628291" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:49:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.
Headlines
OpenSSH 6.4 released (http://openssh.com/txt/release-6.4)
Security fixes in OpenSSH (http://openssh.com/) don't happen very often
6.4 fixes a memory corruption problem, no new features
If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.
Disabling AES-GCM in the server configuration is a workaround
Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9's base OpenSSL is unaffected, for example)
Full details here (http://www.openssh.com/txt/gcmrekey.adv)
***
Getting to know your portmgr-lurkers (http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/)
Next entry in portmgr interview series
This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously
Lots of questions ranging from why he uses BSD to what he had for breakfast
Another one (http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/) was since released, with Antoine Brodin aka antoine@
***
FUSE in OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20131108082749)
As we glossed over last week, FUSE was recently added to OpenBSD
Now the guys from the OpenBSD Journal have tracked down more information
This version is released under an ISC license
Should be in OpenBSD 5.5, released a little less than 6 months from now
Will finally enable things like SSHFS to work in OpenBSD
***
Automated submission of kernel panic reports (https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html)
New tool from Colin Percival
Saves information about kernel panics and emails it to FreeBSD
Lets you review before sending so you can edit out any private info
Automatically encrypted before being sent
FreeBSD never kernel panics so this won't get much use
***
Interview - Justin Sherrill - justin@dragonflybsd.org (mailto:justin@dragonflybsd.org) / @dragonflybsd (https://twitter.com/dragonflybsd)
DragonflyBSD 3.6 and the Dragonfly Digest (http://www.shiningsilence.com/dbsdlog/)
Tutorial
Building an OpenBSD Router (http://www.bsdnow.tv/tutorials/openbsd-router)
News Roundup
BSD router project 1.5 released (http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/)
Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router
It's an alternative to pfSense, but not nearly as well known or popular
New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes
Fits on a 256MB Compact Flash/USB drive
***
Curve25519 now default key exchange (http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e)
We mentioned in an earlier episode about a patch for curve25519 (http://cr.yp.to/ecdh.html)
Now it's become the default for key exchange
Will probably make its way into OpenSSH 6.5, would've been in 6.4 if we didn't have that security vulnerability
It's interesting to see all these big changes in cryptography in OpenBSD lately
***
FreeBSD kernel selection in boot menu (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=257650)
Adds a kernel selection menu to the beastie menu
List of kernels is taken from 'kernels' in loader.conf as a space or comma separated list of names to display (up to 9)
From our good buddy Devin Teske (http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities)
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/)
PCDM has officially replaced GDM as the default login manager
New ISO build scripts (we got a sneak preview last week)
Lots of bug fixes
Second set of 10-STABLE ISOs available with new artwork and much more
***
Theo de Raadt speaking at MUUG (http://undeadly.org/cgi?action=article&amp;amp;sid=20131113074042&amp;amp;mode=expanded&amp;amp;count=0)
Theo will be speaking at Manitoba UNIX User Group in Winnipeg
On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)
If you're watching the show live you have time to make plans, if you're watching the downloaded version it might be happening right now!
No agenda, but expect some OpenBSD discussion
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s21YXhiLRB)
James writes in (http://slexy.org/view/s215EjcgdM)
Allen writes in (http://slexy.org/view/s21mCP2ecL)
Chess writes in (http://slexy.org/view/s207ePFrna)
Frank writes in (http://slexy.org/view/s20iVFXJve)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, building, bsd, router, gateway, soho, small home office, pcbsd, server, tutorial, guide, howto, interview, firewall, network, hammer fs, dragonfly, openssh, 6.4, dragonfly digest, aes gcm, openssl, bsd router project, tbrp, portmgr, fuse, filesystem in userspace, kernel panic, automatic</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
