<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 17:27:06 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Ghostbsd”</title>
    <link>https://www.bsdnow.tv/tags/ghostbsd</link>
    <pubDate>Thu, 16 Oct 2025 09:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>633: Magical Systems Thinking</title>
  <link>https://www.bsdnow.tv/633</link>
  <guid isPermaLink="false">4d736424-c75d-48e7-bd89-87f4b4a6fa41</guid>
  <pubDate>Thu, 16 Oct 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4d736424-c75d-48e7-bd89-87f4b4a6fa41.mp3" length="64108416" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>ZFS Features, Roadmap, and Innovations, Magical systems thinking, How VMware’s Debt-Fueled Acquisition Is Killing Open Source, OpenSSH 10.1 Released, KDE Plasma 6 Wayland on FreeBSD, Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS, Balkanization of the Internet, GhostBSD 25.02 adds 'Gershwin' desktop for a Mac-like twist, and more</itunes:subtitle>
  <itunes:duration>1:06:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>ZFS Features, Roadmap, and Innovations, Magical systems thinking, How VMware’s Debt-Fueled Acquisition Is Killing Open Source, OpenSSH 10.1 Released, KDE Plasma 6 Wayland on FreeBSD, Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS, Balkanization of the Internet, GhostBSD 25.02 adds 'Gershwin' desktop for a Mac-like twist, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
What the Future Brings – ZFS Features, Roadmap, and Innovations (https://klarasystems.com/articles/zfs-new-features-roadmap-innovations?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast)
Magical systems thinking (https://worksinprogress.co/issue/magical-systems-thinking)
The $69 Billion Domino Effect: How VMware’s Debt-Fueled Acquisition Is Killing Open Source, One Repository at a Time (https://fastcode.io/2025/08/30/the-69-billion-domino-effect-how-vmwares-debt-fueled-acquisition-is-killing-open-source-one-repository-at-a-time)
News Roundup
OpenSSH 10.1 Released (https://www.openssh.com/txt/release-10.1)
KDE Plasma 6 Wayland on FreeBSD (https://euroquis.nl/kde/2025/09/07/wayland.html)
Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS (https://thenewstack.io/unix-co-creator-brian-kernighan-on-rust-distros-and-nixos)
GhostBSD 25.02 adds 'Gershwin' desktop for a Mac-like twist (https://www.theregister.com/2025/08/27/ghostbsd_2502/)
Beastie Bits
Adventures in porting a Wayland Compositor to NetBSD and OpenBSD by Jeff Frasca (https://www.youtube.com/watch?v=oo_8gnWQ4xo)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Kylen - CVEs (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/633/feedback/Kylen%20-%20CVEs.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, features, roadmap, innovations, systems thinking, magical, debt-fueled acquisition, kde plasma 6, wayland, brian Kernighan, rust, distro, nixos, ghostbsd, gershwin, mac-like</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>ZFS Features, Roadmap, and Innovations, Magical systems thinking, How VMware’s Debt-Fueled Acquisition Is Killing Open Source, OpenSSH 10.1 Released, KDE Plasma 6 Wayland on FreeBSD, Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS, Balkanization of the Internet, GhostBSD 25.02 adds &#39;Gershwin&#39; desktop for a Mac-like twist, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/zfs-new-features-roadmap-innovations?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">What the Future Brings – ZFS Features, Roadmap, and Innovations</a></p>

<hr>

<p><a href="https://worksinprogress.co/issue/magical-systems-thinking" rel="nofollow">Magical systems thinking</a></p>

<hr>

<p><a href="https://fastcode.io/2025/08/30/the-69-billion-domino-effect-how-vmwares-debt-fueled-acquisition-is-killing-open-source-one-repository-at-a-time" rel="nofollow">The $69 Billion Domino Effect: How VMware’s Debt-Fueled Acquisition Is Killing Open Source, One Repository at a Time</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.openssh.com/txt/release-10.1" rel="nofollow">OpenSSH 10.1 Released</a></p>

<hr>

<p><a href="https://euroquis.nl/kde/2025/09/07/wayland.html" rel="nofollow">KDE Plasma 6 Wayland on FreeBSD</a></p>

<hr>

<p><a href="https://thenewstack.io/unix-co-creator-brian-kernighan-on-rust-distros-and-nixos" rel="nofollow">Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS</a></p>

<hr>

<p><a href="https://www.theregister.com/2025/08/27/ghostbsd_2502/" rel="nofollow">GhostBSD 25.02 adds &#39;Gershwin&#39; desktop for a Mac-like twist</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=oo_8gnWQ4xo" rel="nofollow">Adventures in porting a Wayland Compositor to NetBSD and OpenBSD by Jeff Frasca</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/633/feedback/Kylen%20-%20CVEs.md" rel="nofollow">Kylen - CVEs</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>ZFS Features, Roadmap, and Innovations, Magical systems thinking, How VMware’s Debt-Fueled Acquisition Is Killing Open Source, OpenSSH 10.1 Released, KDE Plasma 6 Wayland on FreeBSD, Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS, Balkanization of the Internet, GhostBSD 25.02 adds &#39;Gershwin&#39; desktop for a Mac-like twist, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/zfs-new-features-roadmap-innovations?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">What the Future Brings – ZFS Features, Roadmap, and Innovations</a></p>

<hr>

<p><a href="https://worksinprogress.co/issue/magical-systems-thinking" rel="nofollow">Magical systems thinking</a></p>

<hr>

<p><a href="https://fastcode.io/2025/08/30/the-69-billion-domino-effect-how-vmwares-debt-fueled-acquisition-is-killing-open-source-one-repository-at-a-time" rel="nofollow">The $69 Billion Domino Effect: How VMware’s Debt-Fueled Acquisition Is Killing Open Source, One Repository at a Time</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.openssh.com/txt/release-10.1" rel="nofollow">OpenSSH 10.1 Released</a></p>

<hr>

<p><a href="https://euroquis.nl/kde/2025/09/07/wayland.html" rel="nofollow">KDE Plasma 6 Wayland on FreeBSD</a></p>

<hr>

<p><a href="https://thenewstack.io/unix-co-creator-brian-kernighan-on-rust-distros-and-nixos" rel="nofollow">Unix Co-Creator Brian Kernighan on Rust, Distros and NixOS</a></p>

<hr>

<p><a href="https://www.theregister.com/2025/08/27/ghostbsd_2502/" rel="nofollow">GhostBSD 25.02 adds &#39;Gershwin&#39; desktop for a Mac-like twist</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=oo_8gnWQ4xo" rel="nofollow">Adventures in porting a Wayland Compositor to NetBSD and OpenBSD by Jeff Frasca</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/633/feedback/Kylen%20-%20CVEs.md" rel="nofollow">Kylen - CVEs</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>611: Ghosty Things</title>
  <link>https://www.bsdnow.tv/611</link>
  <guid isPermaLink="false">3436e540-2590-4a5e-9caa-5762b7c159bd</guid>
  <pubDate>Thu, 15 May 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3436e540-2590-4a5e-9caa-5762b7c159bd.mp3" length="47079552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GhostBSD: From Usability to Struggle and Renewal, Why You Can’t Trust AI to Tune ZFS, Introducing bpflogd(8): capture packets via BPF to log files, What I'd do as a College Freshman in 2025, FreeBSD and KDE Plasma generations, Improvements to the FreeBSD CI/CD systems, FreeBSD as a Workstation, and more</itunes:subtitle>
  <itunes:duration>49:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GhostBSD: From Usability to Struggle and Renewal, Why You Can’t Trust AI to Tune ZFS, Introducing bpflogd(8): capture packets via BPF to log files, What I'd do as a College Freshman in 2025, FreeBSD and KDE Plasma generations, Improvements to the FreeBSD CI/CD systems, FreeBSD as a Workstation, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
GhostBSD: From Usability to Struggle and Renewal (https://freebsdfoundation.org/our-work/journal/browser-based-edition/downstreams/ghostbsd-from-usability-to-struggle-and-renewal/)
Why You Can’t Trust AI to Tune ZFS (https://klarasystems.com/articles/why-you-cant-trust-ai-to-tune-zfs/?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast)
News Roundup
Introducing bpflogd(8): capture packets via BPF to log files (http://undeadly.org/cgi?action=article;sid=20250425074505)
What I'd do as a College Freshman in 2025 (https://muratbuffalo.blogspot.com/2025/04/what-id-do-as-college-freshman.html)
FreeBSD and KDE Plasma generations (https://euroquis.nl//freebsd/2025/03/02/kde5.html)
Improvements to the FreeBSD CI/CD systems (https://freebsdfoundation.org/blog/improvements-to-the-freebsd-ci-cd-systems/)
FreeBSD as a Workstation (https://darknet.sytes.net/wordpress/index.php/2025/03/16/freebsd-as-a-workstation/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Effie - FreeBSD as a Workstation (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/611/feedback/effie%20-%20freebsd%20as%20a%20workstation.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, struggle and renewal, ghostbsd, no trust ai, zfs tuning, bpflogd, packet capture, bpf, log files, logging, college Freshman, KDE Plasma generations, Improvements, CI/CD system, workstation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GhostBSD: From Usability to Struggle and Renewal, Why You Can’t Trust AI to Tune ZFS, Introducing bpflogd(8): capture packets via BPF to log files, What I&#39;d do as a College Freshman in 2025, FreeBSD and KDE Plasma generations, Improvements to the FreeBSD CI/CD systems, FreeBSD as a Workstation, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://freebsdfoundation.org/our-work/journal/browser-based-edition/downstreams/ghostbsd-from-usability-to-struggle-and-renewal/" rel="nofollow">GhostBSD: From Usability to Struggle and Renewal</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/why-you-cant-trust-ai-to-tune-zfs/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Why You Can’t Trust AI to Tune ZFS</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="http://undeadly.org/cgi?action=article;sid=20250425074505" rel="nofollow">Introducing bpflogd(8): capture packets via BPF to log files</a></p>

<hr>

<p><a href="https://muratbuffalo.blogspot.com/2025/04/what-id-do-as-college-freshman.html" rel="nofollow">What I&#39;d do as a College Freshman in 2025</a></p>

<hr>

<p><a href="https://euroquis.nl//freebsd/2025/03/02/kde5.html" rel="nofollow">FreeBSD and KDE Plasma generations</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/improvements-to-the-freebsd-ci-cd-systems/" rel="nofollow">Improvements to the FreeBSD CI/CD systems</a></p>

<hr>

<p><a href="https://darknet.sytes.net/wordpress/index.php/2025/03/16/freebsd-as-a-workstation/" rel="nofollow">FreeBSD as a Workstation</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/611/feedback/effie%20-%20freebsd%20as%20a%20workstation.md" rel="nofollow">Effie - FreeBSD as a Workstation</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GhostBSD: From Usability to Struggle and Renewal, Why You Can’t Trust AI to Tune ZFS, Introducing bpflogd(8): capture packets via BPF to log files, What I&#39;d do as a College Freshman in 2025, FreeBSD and KDE Plasma generations, Improvements to the FreeBSD CI/CD systems, FreeBSD as a Workstation, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://freebsdfoundation.org/our-work/journal/browser-based-edition/downstreams/ghostbsd-from-usability-to-struggle-and-renewal/" rel="nofollow">GhostBSD: From Usability to Struggle and Renewal</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/why-you-cant-trust-ai-to-tune-zfs/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Why You Can’t Trust AI to Tune ZFS</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="http://undeadly.org/cgi?action=article;sid=20250425074505" rel="nofollow">Introducing bpflogd(8): capture packets via BPF to log files</a></p>

<hr>

<p><a href="https://muratbuffalo.blogspot.com/2025/04/what-id-do-as-college-freshman.html" rel="nofollow">What I&#39;d do as a College Freshman in 2025</a></p>

<hr>

<p><a href="https://euroquis.nl//freebsd/2025/03/02/kde5.html" rel="nofollow">FreeBSD and KDE Plasma generations</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/improvements-to-the-freebsd-ci-cd-systems/" rel="nofollow">Improvements to the FreeBSD CI/CD systems</a></p>

<hr>

<p><a href="https://darknet.sytes.net/wordpress/index.php/2025/03/16/freebsd-as-a-workstation/" rel="nofollow">FreeBSD as a Workstation</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/611/feedback/effie%20-%20freebsd%20as%20a%20workstation.md" rel="nofollow">Effie - FreeBSD as a Workstation</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>598: UFS1 up-to-date</title>
  <link>https://www.bsdnow.tv/598</link>
  <guid isPermaLink="false">19a5739c-2755-4cee-a0e0-8803f3bc9cbc</guid>
  <pubDate>Thu, 13 Feb 2025 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/19a5739c-2755-4cee-a0e0-8803f3bc9cbc.mp3" length="63105024" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Key Considerations for Benchmarking Network Storage Performance, OpenZFS 2.3.0 available, Updates on AsiaBSDcon, GhostBSD Desktop Conference, Recovering from external zroot, Create a new issue in a Github repository with Ansible, Stories I refuse to believe, date limit in UFS1 filesystem extended, and more</itunes:subtitle>
  <itunes:duration>1:05:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Key Considerations for Benchmarking Network Storage Performance, OpenZFS 2.3.0 available, Updates on AsiaBSDcon, GhostBSD Desktop Conference, Recovering from external zroot, Create a new issue in a Github repository with Ansible, Stories I refuse to believe, date limit in UFS1 filesystem extended, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Key Considerations for Benchmarking Network Storage Performance (https://klarasystems.com/articles/considerations-benchmarking-network-storage-performance/)
OpenZFS 2.3.0 available (https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0)
News Roundup
Updates on AsiaBSDCon 2025 - Cancelled -  (https://lists.asiabsdcon.org/pipermail/announce/2025-January/000046.html)
GhostBSD Desktop Conference (https://www.phoronix.com/news/BSD-Desktop-Conference-GhostBSD)
Recovering from external zroot (https://adventurist.me/posts/00350)
Create a new issue in a Github repository with Ansible (https://jpmens.net/2025/01/25/create-a-new-issue-in-a-github-repository/)
Stories I refuse to believe (https://flak.tedunangst.com/post/stories-i-refuse-to-believe)
Defer the January 19, 2038 date limit in UFS1 filesystems to February 7, 2106 (https://cgit.freebsd.org/src/commit/?id=1111a44301da39d7b7459c784230e1405e8980f8)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Feedback - Nelson - Ada/GCC (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/598/feedback/Nelson%20Feedback.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, considerations, benchmarking, network storage performance, openzfs 2.3.0, asiabsdcon, ghostbsd, desktop conference, recovering, external zroot, github issue, ansible, stories, date limit, ufs1</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Key Considerations for Benchmarking Network Storage Performance, OpenZFS 2.3.0 available, Updates on AsiaBSDcon, GhostBSD Desktop Conference, Recovering from external zroot, Create a new issue in a Github repository with Ansible, Stories I refuse to believe, date limit in UFS1 filesystem extended, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/considerations-benchmarking-network-storage-performance/" rel="nofollow">Key Considerations for Benchmarking Network Storage Performance</a></p>

<hr>

<p><a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0" rel="nofollow">OpenZFS 2.3.0 available</a></p>

<h2>News Roundup</h2>

<p><a href="https://lists.asiabsdcon.org/pipermail/announce/2025-January/000046.html" rel="nofollow">Updates on AsiaBSDCon 2025 - Cancelled - </a></p>

<hr>

<p><a href="https://www.phoronix.com/news/BSD-Desktop-Conference-GhostBSD" rel="nofollow">GhostBSD Desktop Conference</a></p>

<hr>

<p><a href="https://adventurist.me/posts/00350" rel="nofollow">Recovering from external zroot</a></p>

<hr>

<p><a href="https://jpmens.net/2025/01/25/create-a-new-issue-in-a-github-repository/" rel="nofollow">Create a new issue in a Github repository with Ansible</a></p>

<hr>

<p><a href="https://flak.tedunangst.com/post/stories-i-refuse-to-believe" rel="nofollow">Stories I refuse to believe</a></p>

<hr>

<p><a href="https://cgit.freebsd.org/src/commit/?id=1111a44301da39d7b7459c784230e1405e8980f8" rel="nofollow">Defer the January 19, 2038 date limit in UFS1 filesystems to February 7, 2106</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/598/feedback/Nelson%20Feedback.md" rel="nofollow">Feedback - Nelson - Ada/GCC</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Key Considerations for Benchmarking Network Storage Performance, OpenZFS 2.3.0 available, Updates on AsiaBSDcon, GhostBSD Desktop Conference, Recovering from external zroot, Create a new issue in a Github repository with Ansible, Stories I refuse to believe, date limit in UFS1 filesystem extended, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/considerations-benchmarking-network-storage-performance/" rel="nofollow">Key Considerations for Benchmarking Network Storage Performance</a></p>

<hr>

<p><a href="https://github.com/openzfs/zfs/releases/tag/zfs-2.3.0" rel="nofollow">OpenZFS 2.3.0 available</a></p>

<h2>News Roundup</h2>

<p><a href="https://lists.asiabsdcon.org/pipermail/announce/2025-January/000046.html" rel="nofollow">Updates on AsiaBSDCon 2025 - Cancelled - </a></p>

<hr>

<p><a href="https://www.phoronix.com/news/BSD-Desktop-Conference-GhostBSD" rel="nofollow">GhostBSD Desktop Conference</a></p>

<hr>

<p><a href="https://adventurist.me/posts/00350" rel="nofollow">Recovering from external zroot</a></p>

<hr>

<p><a href="https://jpmens.net/2025/01/25/create-a-new-issue-in-a-github-repository/" rel="nofollow">Create a new issue in a Github repository with Ansible</a></p>

<hr>

<p><a href="https://flak.tedunangst.com/post/stories-i-refuse-to-believe" rel="nofollow">Stories I refuse to believe</a></p>

<hr>

<p><a href="https://cgit.freebsd.org/src/commit/?id=1111a44301da39d7b7459c784230e1405e8980f8" rel="nofollow">Defer the January 19, 2038 date limit in UFS1 filesystems to February 7, 2106</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/598/feedback/Nelson%20Feedback.md" rel="nofollow">Feedback - Nelson - Ada/GCC</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>589: The buffering pipe</title>
  <link>https://www.bsdnow.tv/589</link>
  <guid isPermaLink="false">e30d8935-1e67-4f45-8ff5-00690f626b49</guid>
  <pubDate>Thu, 12 Dec 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e30d8935-1e67-4f45-8ff5-00690f626b49.mp3" length="56143488" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Open-Source Software Is in Crisis, A Brief History of Cyrix, Userland Disk I/O, OPNsense 24.7.9 released, GhostBSD 24.10.1 Is Now Available, Why pipes sometimes get "stuck": buffering, Keep your OmniOS server time synced, and more</itunes:subtitle>
  <itunes:duration>58:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Open-Source Software Is in Crisis, A Brief History of Cyrix, Userland Disk I/O, OPNsense 24.7.9 released, GhostBSD 24.10.1 Is Now Available, Why pipes sometimes get "stuck": buffering, Keep your OmniOS server time synced, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Open-Source Software Is in Crisis (https://spectrum.ieee.org/open-source-crisis)
A Brief History of Cyrix (https://www.abortretry.fail/p/a-brief-history-of-cyrix)
News Roundup
Userland Disk I/O (https://transactional.blog/how-to-learn/disk-io)
OPNsense 24.7.9 released (https://forum.opnsense.org/index.php?topic=44133.0)
GhostBSD 24.10.1 Is Now Available (https://ghostbsd.org/news/GhostBSD_24.10.1_Is_Now_Available)
Why pipes sometimes get "stuck": buffering (https://jvns.ca/blog/2024/11/29/why-pipes-get-stuck-buffering/)
Keep your OmniOS server time synced (https://tumfatig.net/2024/keep-your-omnios-server-time-synced/)
Beastie Bits
"I'll take 2" - Solidigm introduces a 122TB Drive, the World’s Highest Capacity PCIe SSDs (https://news.solidigm.com/en-WW/243441-solidigm-122tb-drive)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Ian - Thoughts (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/589/feedback/ian%20-%20toughts.md)
Producer Note
Once we reach Episode 600, I will be backfilling out fireside website with the older episodes (before 283), depending on how your podcast feed service works, you may get a bunch of new notifications of episodes. Sadly there's nothing I can do about that, but I wanted everyone to be aware that.
Also once we hit 600, we will be announcing some new Patreon Perks and new ways you can engage and get involved with the show. More to come in the upcoming weeks as we finalize those plans amongst the team.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, crisis, cyrix, history, userland, disk i/o, opnsense, ghostbsd, pipes, stuck, buffer, buffering, omnios server, time sync, clock</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Open-Source Software Is in Crisis, A Brief History of Cyrix, Userland Disk I/O, OPNsense 24.7.9 released, GhostBSD 24.10.1 Is Now Available, Why pipes sometimes get &quot;stuck&quot;: buffering, Keep your OmniOS server time synced, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://spectrum.ieee.org/open-source-crisis" rel="nofollow">Open-Source Software Is in Crisis</a></p>

<hr>

<p><a href="https://www.abortretry.fail/p/a-brief-history-of-cyrix" rel="nofollow">A Brief History of Cyrix</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://transactional.blog/how-to-learn/disk-io" rel="nofollow">Userland Disk I/O</a></p>

<hr>

<p><a href="https://forum.opnsense.org/index.php?topic=44133.0" rel="nofollow">OPNsense 24.7.9 released</a></p>

<hr>

<p><a href="https://ghostbsd.org/news/GhostBSD_24.10.1_Is_Now_Available" rel="nofollow">GhostBSD 24.10.1 Is Now Available</a></p>

<hr>

<p><a href="https://jvns.ca/blog/2024/11/29/why-pipes-get-stuck-buffering/" rel="nofollow">Why pipes sometimes get &quot;stuck&quot;: buffering</a></p>

<hr>

<p><a href="https://tumfatig.net/2024/keep-your-omnios-server-time-synced/" rel="nofollow">Keep your OmniOS server time synced</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://news.solidigm.com/en-WW/243441-solidigm-122tb-drive" rel="nofollow">&quot;I&#39;ll take 2&quot; - Solidigm introduces a 122TB Drive, the World’s Highest Capacity PCIe SSDs</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/589/feedback/ian%20-%20toughts.md" rel="nofollow">Ian - Thoughts</a></li>
</ul>

<hr>

<h2>Producer Note</h2>

<ul>
<li>Once we reach Episode 600, I will be backfilling out fireside website with the older episodes (before 283), depending on how your podcast feed service works, you may get a bunch of new notifications of episodes. Sadly there&#39;s nothing I can do about that, but I wanted everyone to be aware that.</li>
<li>Also once we hit 600, we will be announcing some new Patreon Perks and new ways you can engage and get involved with the show. More to come in the upcoming weeks as we finalize those plans amongst the team.</li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Open-Source Software Is in Crisis, A Brief History of Cyrix, Userland Disk I/O, OPNsense 24.7.9 released, GhostBSD 24.10.1 Is Now Available, Why pipes sometimes get &quot;stuck&quot;: buffering, Keep your OmniOS server time synced, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://spectrum.ieee.org/open-source-crisis" rel="nofollow">Open-Source Software Is in Crisis</a></p>

<hr>

<p><a href="https://www.abortretry.fail/p/a-brief-history-of-cyrix" rel="nofollow">A Brief History of Cyrix</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://transactional.blog/how-to-learn/disk-io" rel="nofollow">Userland Disk I/O</a></p>

<hr>

<p><a href="https://forum.opnsense.org/index.php?topic=44133.0" rel="nofollow">OPNsense 24.7.9 released</a></p>

<hr>

<p><a href="https://ghostbsd.org/news/GhostBSD_24.10.1_Is_Now_Available" rel="nofollow">GhostBSD 24.10.1 Is Now Available</a></p>

<hr>

<p><a href="https://jvns.ca/blog/2024/11/29/why-pipes-get-stuck-buffering/" rel="nofollow">Why pipes sometimes get &quot;stuck&quot;: buffering</a></p>

<hr>

<p><a href="https://tumfatig.net/2024/keep-your-omnios-server-time-synced/" rel="nofollow">Keep your OmniOS server time synced</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://news.solidigm.com/en-WW/243441-solidigm-122tb-drive" rel="nofollow">&quot;I&#39;ll take 2&quot; - Solidigm introduces a 122TB Drive, the World’s Highest Capacity PCIe SSDs</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/589/feedback/ian%20-%20toughts.md" rel="nofollow">Ian - Thoughts</a></li>
</ul>

<hr>

<h2>Producer Note</h2>

<ul>
<li>Once we reach Episode 600, I will be backfilling out fireside website with the older episodes (before 283), depending on how your podcast feed service works, you may get a bunch of new notifications of episodes. Sadly there&#39;s nothing I can do about that, but I wanted everyone to be aware that.</li>
<li>Also once we hit 600, we will be announcing some new Patreon Perks and new ways you can engage and get involved with the show. More to come in the upcoming weeks as we finalize those plans amongst the team.</li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>440: BSD Inside Zone</title>
  <link>https://www.bsdnow.tv/440</link>
  <guid isPermaLink="false">ff88573d-93b8-4efc-bf5c-5acd4ac555af</guid>
  <pubDate>Thu, 03 Feb 2022 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ff88573d-93b8-4efc-bf5c-5acd4ac555af.mp3" length="26393592" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the "virtual filesystem switch", and more.</itunes:subtitle>
  <itunes:duration>44:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the "virtual filesystem switch", and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
GhostBSD 22.01 is available (https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available)
Packet Scheduling with Dummynet and FreeBSD (https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/)
News Roundup
Inside zone installation (https://ptribble.blogspot.com/2022/01/inside-zone-installation.html)
Why the FreeBSD Desktop and my Linux Rant (https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/)
How to install Gnome on OpenBSD (https://dataswamp.org/~solene/2021-05-07-openbsd-gnome.html)
The important Unix idea of the "virtual filesystem switch" (https://utcc.utoronto.ca/~cks/space/blog/unix/VFSImportance)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Paul - A Plug (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md)
Rollniak - Bhyve Questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md)
Russell - pf pointers (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md)
***
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, GhostBSD, packet scheduling, dummynet, inside zone, installation, desktop, linux rant, gnome, virtual filesystem switch, vfs </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the &quot;virtual filesystem switch&quot;, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available" rel="nofollow">GhostBSD 22.01 is available</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/" rel="nofollow">Packet Scheduling with Dummynet and FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ptribble.blogspot.com/2022/01/inside-zone-installation.html" rel="nofollow">Inside zone installation</a></h3>

<hr>

<h3><a href="https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/" rel="nofollow">Why the FreeBSD Desktop and my Linux Rant</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-05-07-openbsd-gnome.html" rel="nofollow">How to install Gnome on OpenBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/VFSImportance" rel="nofollow">The important Unix idea of the &quot;virtual filesystem switch&quot;</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md" rel="nofollow">Paul - A Plug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md" rel="nofollow">Rollniak - Bhyve Questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md" rel="nofollow">Russell - pf pointers</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the &quot;virtual filesystem switch&quot;, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available" rel="nofollow">GhostBSD 22.01 is available</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/" rel="nofollow">Packet Scheduling with Dummynet and FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ptribble.blogspot.com/2022/01/inside-zone-installation.html" rel="nofollow">Inside zone installation</a></h3>

<hr>

<h3><a href="https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/" rel="nofollow">Why the FreeBSD Desktop and my Linux Rant</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-05-07-openbsd-gnome.html" rel="nofollow">How to install Gnome on OpenBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/VFSImportance" rel="nofollow">The important Unix idea of the &quot;virtual filesystem switch&quot;</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md" rel="nofollow">Paul - A Plug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md" rel="nofollow">Rollniak - Bhyve Questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md" rel="nofollow">Russell - pf pointers</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>433:  GhostBSD of Christmas</title>
  <link>https://www.bsdnow.tv/433</link>
  <guid isPermaLink="false">a47d75e2-ee2d-4fea-af03-c7e8cab86efc</guid>
  <pubDate>Thu, 16 Dec 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a47d75e2-ee2d-4fea-af03-c7e8cab86efc.mp3" length="17996472" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GhostBSD 21.11.24 ISO available, why v7 matters so much, OpenBSD on VIA Eden X2 powered HP t510 Thin Client, OctoPkg GUI Package Manager, chdir(2) support in posix_spawn(3), install doas on FreeBSD, Access Modem's Web Interface with OPNsense, and more</itunes:subtitle>
  <itunes:duration>29:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GhostBSD 21.11.24 ISO available, why v7 matters so much, OpenBSD on VIA Eden X2 powered HP t510 Thin Client, OctoPkg GUI Package Manager, chdir(2) support in posix_spawn(3), install doas on FreeBSD, Access Modem's Web Interface with OPNsense, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
GhostBSD 21.11.24 ISO is now available (https://www.ghostbsd.org/ghostbsd_21.11.24_iso_is_now_available)
Why v7 matters so much (https://utcc.utoronto.ca/~cks/space/blog/unix/V7WhyItMattersSoMuch)
News Roundup
OpenBSD on the VIA Eden X2 powered HP t510 Thin Client (https://www.cambus.net/openbsd-on-the-via-eden-x2-powered-hp-t510-thin-client/)
OctoPkg: A Great GUI Package Manager In FreeBSD (https://nudesystems.com/octopkg-a-great-gui-package-manager-in-freebsd/)
Project Report: Add support for chdir(2) support in posix_spawn(3) (https://blog.netbsd.org/tnf/entry/project_report_add_support_for)
How To Install doas in FreeBSD 13 (https://nudesystems.com/how-to-install-doas-in-freebsd-13/)
How to Access Your Modem's Web Interface with OPNsense (https://homenetworkguy.com/how-to/access-your-modem-web-interface-with-opnsense/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
No feedback for this episode because no one sent any in. :(
I guess we’ve answered every BSD and Unix question that everyone has.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, ghostbsd, v7, VIA, via eden, eden x2, HP, hewlett packard, t510, thin client, octopkg, gui package manager, gui, chdir, posix_spawn, web interface, modem, opnsense </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GhostBSD 21.11.24 ISO available, why v7 matters so much, OpenBSD on VIA Eden X2 powered HP t510 Thin Client, OctoPkg GUI Package Manager, chdir(2) support in posix_spawn(3), install doas on FreeBSD, Access Modem&#39;s Web Interface with OPNsense, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.11.24_iso_is_now_available" rel="nofollow">GhostBSD 21.11.24 ISO is now available</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/V7WhyItMattersSoMuch" rel="nofollow">Why v7 matters so much</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.cambus.net/openbsd-on-the-via-eden-x2-powered-hp-t510-thin-client/" rel="nofollow">OpenBSD on the VIA Eden X2 powered HP t510 Thin Client</a></h3>

<hr>

<h3><a href="https://nudesystems.com/octopkg-a-great-gui-package-manager-in-freebsd/" rel="nofollow">OctoPkg: A Great GUI Package Manager In FreeBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/project_report_add_support_for" rel="nofollow">Project Report: Add support for chdir(2) support in posix_spawn(3)</a></h3>

<hr>

<h3><a href="https://nudesystems.com/how-to-install-doas-in-freebsd-13/" rel="nofollow">How To Install doas in FreeBSD 13</a></h3>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/access-your-modem-web-interface-with-opnsense/" rel="nofollow">How to Access Your Modem&#39;s Web Interface with OPNsense</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<p>No feedback for this episode because no one sent any in. :(<br>
I guess we’ve answered every BSD and Unix question that everyone has.</p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GhostBSD 21.11.24 ISO available, why v7 matters so much, OpenBSD on VIA Eden X2 powered HP t510 Thin Client, OctoPkg GUI Package Manager, chdir(2) support in posix_spawn(3), install doas on FreeBSD, Access Modem&#39;s Web Interface with OPNsense, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.11.24_iso_is_now_available" rel="nofollow">GhostBSD 21.11.24 ISO is now available</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/V7WhyItMattersSoMuch" rel="nofollow">Why v7 matters so much</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.cambus.net/openbsd-on-the-via-eden-x2-powered-hp-t510-thin-client/" rel="nofollow">OpenBSD on the VIA Eden X2 powered HP t510 Thin Client</a></h3>

<hr>

<h3><a href="https://nudesystems.com/octopkg-a-great-gui-package-manager-in-freebsd/" rel="nofollow">OctoPkg: A Great GUI Package Manager In FreeBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/project_report_add_support_for" rel="nofollow">Project Report: Add support for chdir(2) support in posix_spawn(3)</a></h3>

<hr>

<h3><a href="https://nudesystems.com/how-to-install-doas-in-freebsd-13/" rel="nofollow">How To Install doas in FreeBSD 13</a></h3>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/access-your-modem-web-interface-with-opnsense/" rel="nofollow">How to Access Your Modem&#39;s Web Interface with OPNsense</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<p>No feedback for this episode because no one sent any in. :(<br>
I guess we’ve answered every BSD and Unix question that everyone has.</p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>425: Releases galore</title>
  <link>https://www.bsdnow.tv/425</link>
  <guid isPermaLink="false">af8c08aa-71ac-4c87-8145-6a672a9d7e5d</guid>
  <pubDate>Thu, 21 Oct 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/af8c08aa-71ac-4c87-8145-6a672a9d7e5d.mp3" length="25604952" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</itunes:subtitle>
  <itunes:duration>41:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
RISC-V: The New Architecture on the Block (https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/)
If you want more RISC-V, check out JT's interview with Mark Himelstein the CTO of RISC-V International (https://www.opensourcevoices.org/20)
***
### OpenBSD on the Vortex86DX CPU (https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/)
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### Lumina 1.6.1 (http://lumina-desktop.org/post/2021-10-05/)
### opnsense 21.7.3 (https://opnsense.org/opnsense-21-7-3-released/)
### LibreSSL patches (https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl)
### OpenBGPD 7.2 (https://marc.info/?l=openbsd-announce&amp;amp;m=163239274430211&amp;amp;w=2)
### Midnight BSD 2.1.0 (https://www.midnightbsd.org/notes/)
### GhostBSD 21.09 ISO (http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available)
### helloSystemv0.6 (https://github.com/helloSystem/ISO/releases/tag/r0.6.0)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brandon - FreeBSD question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md)
Bruce - Fixing a weird Apache Bug (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md)
Dan - zfs question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords> freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, riscv, vortex86dx, lumina, opensense, libressl, patches, openbgpd, midnightbsd, ghostbsd, hello system</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/" rel="nofollow">RISC-V: The New Architecture on the Block</a></h3>

<ul>
<li>If you want more RISC-V, check out <a href="https://www.opensourcevoices.org/20" rel="nofollow">JT&#39;s interview with Mark Himelstein the CTO of RISC-V International</a>
***
### <a href="https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/" rel="nofollow">OpenBSD on the Vortex86DX CPU</a>
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### <a href="http://lumina-desktop.org/post/2021-10-05/" rel="nofollow">Lumina 1.6.1</a>
### <a href="https://opnsense.org/opnsense-21-7-3-released/" rel="nofollow">opnsense 21.7.3</a>
### <a href="https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl" rel="nofollow">LibreSSL patches</a>
### <a href="https://marc.info/?l=openbsd-announce&m=163239274430211&w=2" rel="nofollow">OpenBGPD 7.2</a>
### <a href="https://www.midnightbsd.org/notes/" rel="nofollow">Midnight BSD 2.1.0</a>
### <a href="http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available" rel="nofollow">GhostBSD 21.09 ISO</a>
### <a href="https://github.com/helloSystem/ISO/releases/tag/r0.6.0" rel="nofollow">helloSystemv0.6</a></li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md" rel="nofollow">Brandon - FreeBSD question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md" rel="nofollow">Bruce - Fixing a weird Apache Bug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md" rel="nofollow">Dan - zfs question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/" rel="nofollow">RISC-V: The New Architecture on the Block</a></h3>

<ul>
<li>If you want more RISC-V, check out <a href="https://www.opensourcevoices.org/20" rel="nofollow">JT&#39;s interview with Mark Himelstein the CTO of RISC-V International</a>
***
### <a href="https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/" rel="nofollow">OpenBSD on the Vortex86DX CPU</a>
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### <a href="http://lumina-desktop.org/post/2021-10-05/" rel="nofollow">Lumina 1.6.1</a>
### <a href="https://opnsense.org/opnsense-21-7-3-released/" rel="nofollow">opnsense 21.7.3</a>
### <a href="https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl" rel="nofollow">LibreSSL patches</a>
### <a href="https://marc.info/?l=openbsd-announce&m=163239274430211&w=2" rel="nofollow">OpenBGPD 7.2</a>
### <a href="https://www.midnightbsd.org/notes/" rel="nofollow">Midnight BSD 2.1.0</a>
### <a href="http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available" rel="nofollow">GhostBSD 21.09 ISO</a>
### <a href="https://github.com/helloSystem/ISO/releases/tag/r0.6.0" rel="nofollow">helloSystemv0.6</a></li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md" rel="nofollow">Brandon - FreeBSD question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md" rel="nofollow">Bruce - Fixing a weird Apache Bug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md" rel="nofollow">Dan - zfs question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>420: OpenBSD makes life better</title>
  <link>https://www.bsdnow.tv/420</link>
  <guid isPermaLink="false">8b8bd7d2-7ac2-4c6b-a33f-fcc39e355be5</guid>
  <pubDate>Thu, 16 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8b8bd7d2-7ac2-4c6b-a33f-fcc39e355be5.mp3" length="32538960" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO's now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.
</itunes:subtitle>
  <itunes:duration>49:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO's now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Choosing The Right ZFS Pool Layout (https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/)
Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too) (https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html)
News Roundup
GhostBSD 21.09.06 ISO's now available (https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available)
Fair Internet bandwidth management on a network using OpenBSD (https://dataswamp.org/~solene/2021-08-30-openbsd-qos-lan.html)
NetBSD wifi router project update (https://blog.netbsd.org/tnf/entry/wifi_project_status_update)
Bonus NetBSD Recent Developments: NetBSD on the Apple M1 (https://mobile.twitter.com/jmcwhatever/status/1431575270436319235)
***
### HardenedBSD August 2021 Status Report (https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report)
### FreeBSD Journal July/August 2021: Desktop/Wireless (https://freebsdfoundation.org/past-issues/desktop-wireless/)
***
### Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
James - backup question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md)
Jonathon - certifications (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md)
Marty - RPG CLI (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md)
*** 
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, pool layout, changes, improvements, ghostbsd, internet, bandwidth management, wifi, router, router project, Apple M1, arm64, wireless, desktop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO&#39;s now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/" rel="nofollow">Choosing The Right ZFS Pool Layout</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html" rel="nofollow">Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available" rel="nofollow">GhostBSD 21.09.06 ISO&#39;s now available</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-30-openbsd-qos-lan.html" rel="nofollow">Fair Internet bandwidth management on a network using OpenBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/wifi_project_status_update" rel="nofollow">NetBSD wifi router project update</a></h3>

<ul>
<li>Bonus NetBSD Recent Developments: <a href="https://mobile.twitter.com/jmcwhatever/status/1431575270436319235" rel="nofollow">NetBSD on the Apple M1</a>
***
### <a href="https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report" rel="nofollow">HardenedBSD August 2021 Status Report</a>
### <a href="https://freebsdfoundation.org/past-issues/desktop-wireless/" rel="nofollow">FreeBSD Journal July/August 2021: Desktop/Wireless</a>
***
### Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md" rel="nofollow">James - backup question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md" rel="nofollow">Jonathon - certifications</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md" rel="nofollow">Marty - RPG CLI</a>
*** </li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO&#39;s now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/" rel="nofollow">Choosing The Right ZFS Pool Layout</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html" rel="nofollow">Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available" rel="nofollow">GhostBSD 21.09.06 ISO&#39;s now available</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-30-openbsd-qos-lan.html" rel="nofollow">Fair Internet bandwidth management on a network using OpenBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/wifi_project_status_update" rel="nofollow">NetBSD wifi router project update</a></h3>

<ul>
<li>Bonus NetBSD Recent Developments: <a href="https://mobile.twitter.com/jmcwhatever/status/1431575270436319235" rel="nofollow">NetBSD on the Apple M1</a>
***
### <a href="https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report" rel="nofollow">HardenedBSD August 2021 Status Report</a>
### <a href="https://freebsdfoundation.org/past-issues/desktop-wireless/" rel="nofollow">FreeBSD Journal July/August 2021: Desktop/Wireless</a>
***
### Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md" rel="nofollow">James - backup question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md" rel="nofollow">Jonathon - certifications</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md" rel="nofollow">Marty - RPG CLI</a>
*** </li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>419: Rethinking OS installs</title>
  <link>https://www.bsdnow.tv/419</link>
  <guid isPermaLink="false">4fb1ef2f-3915-403b-9687-47451b3339a9</guid>
  <pubDate>Thu, 09 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4fb1ef2f-3915-403b-9687-47451b3339a9.mp3" length="33694320" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</itunes:subtitle>
  <itunes:duration>51:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Reviewing my first OpenBSD port, and what I'd do differently 10 years later (https://briancallahan.net/blog/20210802.html)
Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11 (https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html)
News Roundup
FreeBSD Experiment Rethinks the OS Install (https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/)
The switch to FreeBSD rc.d is coming (https://www.ghostbsd.org/rc_switch)
Irix gets LLVM (https://forums.irixnet.org/thread-3043.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Miceal - a few questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md)
Nelson - dummynet (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, port, review, done differently, learning, retrospect, DEC, alpha cpu, qemu, x11, os install, rethink, ghostbsd, rc.d, irix, llvm </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>415: Wrong OS Switch</title>
  <link>https://www.bsdnow.tv/415</link>
  <guid isPermaLink="false">272363c1-3756-4e81-91c6-a373b2104cc6</guid>
  <pubDate>Thu, 12 Aug 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/272363c1-3756-4e81-91c6-a373b2104cc6.mp3" length="33829368" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>54:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Wrong Way to Switch Server OS, Net/1 and Net/2 – A Path to Freedom, Permissions Two Mistakes, OpenBSD progress in supporting riscv64 platform, I2P intro, git sync murder is out, GhostBSD init system poll, and more  
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
The Wrong Way to Switch Operating Systems on Your Server (https://figbert.com/posts/wrong-way-to-switch-server-os/)
History of FreeBSD Part 5: Net/1 and Net/2 – A Path to Freedom (https://klarasystems.com/articles/history-of-freebsd-net-1-and-net-2-a-path-to-freedom/)
News Roundup
Permissions Two Mistakes (https://utcc.utoronto.ca/~cks/space/blog/unix/PermissionsTwoMistakes)
Progress in support for the riscv64 platform (https://undeadly.org/cgi?action=article;sid=20210619161607)
I2P Intro (https://dataswamp.org/~solene/2021-06-20-i2p-intro.html)
“$ git sync murder” is out, so: how many books have I written? (https://mwl.io/archives/12105)
What init system would you prefer to use under GhostBSD? (https://www.ghostbsd.org/what_init_system_pool)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brad - Replication (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Brad%20-%20Replication.md)
Benedict writes after the show was over: The tool is called https://github.com/allanjude/zxfer
Tom tweeted right after recording stopped: 
https://twitter.com/adventureloop/status/1420478529238622210
Caleb - Pronunciation of Gemini (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Caleb%20-%20Pronounciation%20of%20Gemini.md)
Dan - Writeup about a DO FreeBSD Droplet (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Dan%20-%20Writeup%20about%20a%20DO%20FreeBSD%20Droplet.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, switch, server os, net/1, net/2, freedom, permissions, mistakes, riscv64, i2p, git sync murder, ghostbsd, init system </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wrong Way to Switch Server OS, Net/1 and Net/2 – A Path to Freedom, Permissions Two Mistakes, OpenBSD progress in supporting riscv64 platform, I2P intro, git sync murder is out, GhostBSD init system poll, and more  </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://figbert.com/posts/wrong-way-to-switch-server-os/" rel="nofollow">The Wrong Way to Switch Operating Systems on Your Server</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/history-of-freebsd-net-1-and-net-2-a-path-to-freedom/" rel="nofollow">History of FreeBSD Part 5: Net/1 and Net/2 – A Path to Freedom</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/PermissionsTwoMistakes" rel="nofollow">Permissions Two Mistakes</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210619161607" rel="nofollow">Progress in support for the riscv64 platform</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-20-i2p-intro.html" rel="nofollow">I2P Intro</a></h3>

<hr>

<h3><a href="https://mwl.io/archives/12105" rel="nofollow">“$ git sync murder” is out, so: how many books have I written?</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/what_init_system_pool" rel="nofollow">What init system would you prefer to use under GhostBSD?</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Brad%20-%20Replication.md" rel="nofollow">Brad - Replication</a>
Benedict writes after the show was over: The tool is called <a href="https://github.com/allanjude/zxfer" rel="nofollow">https://github.com/allanjude/zxfer</a>
Tom tweeted right after recording stopped: 
<a href="https://twitter.com/adventureloop/status/1420478529238622210" rel="nofollow">https://twitter.com/adventureloop/status/1420478529238622210</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Caleb%20-%20Pronounciation%20of%20Gemini.md" rel="nofollow">Caleb - Pronunciation of Gemini</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Dan%20-%20Writeup%20about%20a%20DO%20FreeBSD%20Droplet.md" rel="nofollow">Dan - Writeup about a DO FreeBSD Droplet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wrong Way to Switch Server OS, Net/1 and Net/2 – A Path to Freedom, Permissions Two Mistakes, OpenBSD progress in supporting riscv64 platform, I2P intro, git sync murder is out, GhostBSD init system poll, and more  </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://figbert.com/posts/wrong-way-to-switch-server-os/" rel="nofollow">The Wrong Way to Switch Operating Systems on Your Server</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/history-of-freebsd-net-1-and-net-2-a-path-to-freedom/" rel="nofollow">History of FreeBSD Part 5: Net/1 and Net/2 – A Path to Freedom</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/PermissionsTwoMistakes" rel="nofollow">Permissions Two Mistakes</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210619161607" rel="nofollow">Progress in support for the riscv64 platform</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-20-i2p-intro.html" rel="nofollow">I2P Intro</a></h3>

<hr>

<h3><a href="https://mwl.io/archives/12105" rel="nofollow">“$ git sync murder” is out, so: how many books have I written?</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/what_init_system_pool" rel="nofollow">What init system would you prefer to use under GhostBSD?</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Brad%20-%20Replication.md" rel="nofollow">Brad - Replication</a>
Benedict writes after the show was over: The tool is called <a href="https://github.com/allanjude/zxfer" rel="nofollow">https://github.com/allanjude/zxfer</a>
Tom tweeted right after recording stopped: 
<a href="https://twitter.com/adventureloop/status/1420478529238622210" rel="nofollow">https://twitter.com/adventureloop/status/1420478529238622210</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Caleb%20-%20Pronounciation%20of%20Gemini.md" rel="nofollow">Caleb - Pronunciation of Gemini</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/415/feedback/Dan%20-%20Writeup%20about%20a%20DO%20FreeBSD%20Droplet.md" rel="nofollow">Dan - Writeup about a DO FreeBSD Droplet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>388: Must-have security tool</title>
  <link>https://www.bsdnow.tv/388</link>
  <guid isPermaLink="false">df800c64-9bac-467b-be5c-088a4cd94882</guid>
  <pubDate>Thu, 04 Feb 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/df800c64-9bac-467b-be5c-088a4cd94882.mp3" length="51435504" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Q4 2020 Status report, a must-have security tool from OpenBSD, Bastille Port Redirection and Persistence, FreeBSD Wall Display Computer, etymology of command-line tools, GhostBSD 21.01.15 Release Notes, and more.</itunes:subtitle>
  <itunes:duration>49:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD Q4 2020 Status report, a must-have security tool from OpenBSD, Bastille Port Redirection and Persistence, FreeBSD Wall Display Computer, etymology of command-line tools, GhostBSD 21.01.15 Release Notes, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
FreeBSD quarterly status report for Q4 2020 (https://www.freebsd.org/news/status/report-2020-10-2020-12/)
Block spammers/abusive IPs with Pf-badhost in OpenBSD. A 'must have' security tool! (https://undeadly.org/cgi?action=article;sid=20210119113425)
Pf-badhost is a very practical, robust, stable and lightweight security script for network servers.
It's compatible with BSD based operating systems such as {Open,Free,Net,Dragonfly}BSD and MacOS. It prevents potentially-bad IP addresses that could possibly attack your servers (and waste your bandwidth and fill your logfiles), by blocking all those IPs contacting your server, and therefore it makes your server network/resources lighter and the logs of important services running on your server become simpler, more readable and efficient.
News Roundup
Bastille Port Redirection and Persistence (https://bastillebsd.org/blog/2021/01/13/bastille-port-redirection-and-persistence/)
Bastille supports redirecting (rdr) ports from the host system into target containers. This port redirection is commonly used when running Internet services such as web servers, dns servers, email and many others. Any service you want to make public outside of your cluster will likely require port redirection (with some exceptions, see below).
FreeBSD Wall Display Computer (https://blog.tyk.nu/blog/freebsd-wall-display-computer/)
I've recently added a wall mounted 30" monitor for Grafana in my home. I can highly recommend doing the same, especially in a world where more work from home is becoming the norm.
The etymology of command-line tools (https://i.redd.it/sni9gaxfj2d61.png)
GhostBSD 21.01.15 Release Notes (https://ghostbsd.org/21.01.15_release_notes)
I am happy to announce the availability of the new ISO 21.01.15. This new ISO comes with a clean-up of packages that include removing LibreOffice and Telegram from the default selection. We did this to bring the zfs RW live file systems to run without problem on 4GB of ram machine. We also removed the UFS full disk option from the installer. Users can still use custom partitions to setup UFS partition, but we discourage it. We also fixed the Next button's restriction in the custom partition related to some bug that people reported. We also fix the missing default locale setup and added the default setup for Linux Steam, not to forget this ISO includes kernel, userland and numerous application updates.
Beastie Bits
Interview with Brian Kernighan (https://corecursive.com/brian-kernighan-unix-bell-labs1/)
***
###Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, quarterly, quarter, fourth, 2020, report, status, security, tool, bastille, port, redirection, persistence, wall display, display, etymology. command-line, ghostbsd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Q4 2020 Status report, a must-have security tool from OpenBSD, Bastille Port Redirection and Persistence, FreeBSD Wall Display Computer, etymology of command-line tools, GhostBSD 21.01.15 Release Notes, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-10-2020-12/" rel="nofollow">FreeBSD quarterly status report for Q4 2020</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210119113425" rel="nofollow">Block spammers/abusive IPs with Pf-badhost in OpenBSD. A &#39;must have&#39; security tool!</a></h3>

<blockquote>
<p>Pf-badhost is a very practical, robust, stable and lightweight security script for network servers.<br>
It&#39;s compatible with BSD based operating systems such as {Open,Free,Net,Dragonfly}BSD and MacOS. It prevents potentially-bad IP addresses that could possibly attack your servers (and waste your bandwidth and fill your logfiles), by blocking all those IPs contacting your server, and therefore it makes your server network/resources lighter and the logs of important services running on your server become simpler, more readable and efficient.</p>

<hr>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bastillebsd.org/blog/2021/01/13/bastille-port-redirection-and-persistence/" rel="nofollow">Bastille Port Redirection and Persistence</a></h3>

<blockquote>
<p>Bastille supports redirecting (rdr) ports from the host system into target containers. This port redirection is commonly used when running Internet services such as web servers, dns servers, email and many others. Any service you want to make public outside of your cluster will likely require port redirection (with some exceptions, see below).</p>

<hr>

<h3><a href="https://blog.tyk.nu/blog/freebsd-wall-display-computer/" rel="nofollow">FreeBSD Wall Display Computer</a></h3>

<p>I&#39;ve recently added a wall mounted 30&quot; monitor for Grafana in my home. I can highly recommend doing the same, especially in a world where more work from home is becoming the norm.</p>

<hr>

<h3><a href="https://i.redd.it/sni9gaxfj2d61.png" rel="nofollow">The etymology of command-line tools</a></h3>

<hr>

<h3><a href="https://ghostbsd.org/21.01.15_release_notes" rel="nofollow">GhostBSD 21.01.15 Release Notes</a></h3>

<p>I am happy to announce the availability of the new ISO 21.01.15. This new ISO comes with a clean-up of packages that include removing LibreOffice and Telegram from the default selection. We did this to bring the zfs RW live file systems to run without problem on 4GB of ram machine. We also removed the UFS full disk option from the installer. Users can still use custom partitions to setup UFS partition, but we discourage it. We also fixed the Next button&#39;s restriction in the custom partition related to some bug that people reported. We also fix the missing default locale setup and added the default setup for Linux Steam, not to forget this ISO includes kernel, userland and numerous application updates.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://corecursive.com/brian-kernighan-unix-bell-labs1/" rel="nofollow">Interview with Brian Kernighan</a>
***
###Tarsnap</li>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Q4 2020 Status report, a must-have security tool from OpenBSD, Bastille Port Redirection and Persistence, FreeBSD Wall Display Computer, etymology of command-line tools, GhostBSD 21.01.15 Release Notes, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-10-2020-12/" rel="nofollow">FreeBSD quarterly status report for Q4 2020</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210119113425" rel="nofollow">Block spammers/abusive IPs with Pf-badhost in OpenBSD. A &#39;must have&#39; security tool!</a></h3>

<blockquote>
<p>Pf-badhost is a very practical, robust, stable and lightweight security script for network servers.<br>
It&#39;s compatible with BSD based operating systems such as {Open,Free,Net,Dragonfly}BSD and MacOS. It prevents potentially-bad IP addresses that could possibly attack your servers (and waste your bandwidth and fill your logfiles), by blocking all those IPs contacting your server, and therefore it makes your server network/resources lighter and the logs of important services running on your server become simpler, more readable and efficient.</p>

<hr>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bastillebsd.org/blog/2021/01/13/bastille-port-redirection-and-persistence/" rel="nofollow">Bastille Port Redirection and Persistence</a></h3>

<blockquote>
<p>Bastille supports redirecting (rdr) ports from the host system into target containers. This port redirection is commonly used when running Internet services such as web servers, dns servers, email and many others. Any service you want to make public outside of your cluster will likely require port redirection (with some exceptions, see below).</p>

<hr>

<h3><a href="https://blog.tyk.nu/blog/freebsd-wall-display-computer/" rel="nofollow">FreeBSD Wall Display Computer</a></h3>

<p>I&#39;ve recently added a wall mounted 30&quot; monitor for Grafana in my home. I can highly recommend doing the same, especially in a world where more work from home is becoming the norm.</p>

<hr>

<h3><a href="https://i.redd.it/sni9gaxfj2d61.png" rel="nofollow">The etymology of command-line tools</a></h3>

<hr>

<h3><a href="https://ghostbsd.org/21.01.15_release_notes" rel="nofollow">GhostBSD 21.01.15 Release Notes</a></h3>

<p>I am happy to announce the availability of the new ISO 21.01.15. This new ISO comes with a clean-up of packages that include removing LibreOffice and Telegram from the default selection. We did this to bring the zfs RW live file systems to run without problem on 4GB of ram machine. We also removed the UFS full disk option from the installer. Users can still use custom partitions to setup UFS partition, but we discourage it. We also fixed the Next button&#39;s restriction in the custom partition related to some bug that people reported. We also fix the missing default locale setup and added the default setup for Linux Steam, not to forget this ISO includes kernel, userland and numerous application updates.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://corecursive.com/brian-kernighan-unix-bell-labs1/" rel="nofollow">Interview with Brian Kernighan</a>
***
###Tarsnap</li>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>348: BSD Community Collections</title>
  <link>https://www.bsdnow.tv/348</link>
  <guid isPermaLink="false">ed288ede-fe94-433f-85a4-6eebb8cb2478</guid>
  <pubDate>Thu, 30 Apr 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ed288ede-fe94-433f-85a4-6eebb8cb2478.mp3" length="43398814" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</itunes:subtitle>
  <itunes:duration>1:00:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.
Headlines
FuryBSD 2020Q2 Images Available for XFCE and KDE (https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/)
The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. 
Technical reasons to choose FreeBSD over GNU/Linux (https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html)
Since I wrote my article "Why you should migrate everything from Linux to BSD" I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.
News Roundup
+ Not actually Linux distro review deux: GhostBSD (https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/)
When I began work on the FreeBSD 12.1-RELEASE review last week, it didn't take long to figure out that the desktop portion wasn't going very smoothly.
I think it's important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.
GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.
“TLS Mastery” sponsorships open (https://mwl.io/archives/6265)
My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.
This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.
JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:
JT's post: https://twitter.com/q5sys/status/1251194823589138432
High Resolution Image to see the bottom shelf better: https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg
Closeup of the BSD Section: https://twitter.com/q5sys/status/1251294290782928897
Others jumped in with their collections:
Deb Goodkin's collection: https://twitter.com/dgoodkin/status/1251294016139743232 &amp;amp; https://twitter.com/dgoodkin/status/1251298125672660992
FreeBSD Frau's FreeBSD Collection: https://twitter.com/freebsdfrau/status/1251290430475350018
Jason Tubnor's OpenBSD Collection: https://twitter.com/Tubsta/status/1251265902214918144
Do you have a nice collection, take a picture and send it in!
Tale of OpenBSD secure memory allocator internals - malloc(3) (https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html)
Hi there,
It's been a very long time I haven't written anything after my last OpenBSD blogs, that is, 
OpenBSD Kernel Internals — Creation of process from user-space to kernel space.
OpenBSD: Introduction to execpromises in the pledge(2)
pledge(2): OpenBSD's defensive approach to OS Security
So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator
How I learned to stop worrying and love SSDs (https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/)
my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?
So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?
Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.
My infrastructure as of 2019 (https://chown.me/blog/infrastructure-2019.html)
I've wanted to write about my infrastructure for a while, but I kept thinking, "I'll wait until after I've done $nextthingonmytodo." Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I'll write an update on it in a couple of moons; who knows?
For something different than our usual Beastie Bits… we bring you…
We're all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we'll feature you!
Installation of NetBSD on a Mac Mini (https://e17i.github.io/articles-netbsd-install/)
OpenBSD on the HP Envy 13 (https://icyphox.sh/blog/openbsd-hp-envy/)
Install NetBSD on a Vintage Computer (https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer)
BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC (https://twitter.com/allanjude/status/1251895348836143104)
Allan started a series of FreeBSD Office Hours (https://wiki.freebsd.org/OfficeHours)
BSDNow is going Independent
After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.
Feedback/Questions
Todd - LinusTechTips Claims about ZFS (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips'%20claims%20on%20ZFS.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, furybsd, kde, xfce, GhostBSD, Ars Technica, TLS, tls mastery, tls mastery book, book sponsorship, collections, secure memory allocator, internals, memory allocator, memory allocator internals, ssd, solid state drive</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>343: FreeBSD, Corona: Fight!</title>
  <link>https://www.bsdnow.tv/343</link>
  <guid isPermaLink="false">1752e8c2-3d6e-40dc-8bd9-5c7654660b15</guid>
  <pubDate>Thu, 26 Mar 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1752e8c2-3d6e-40dc-8bd9-5c7654660b15.mp3" length="28131915" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</itunes:subtitle>
  <itunes:duration>39:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.
Headlines
Fighting the Coronavirus with FreeBSD (https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/)
Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.
UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.
Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.
How to configure the Wireguard VPN in OPNsense (https://homenetworkguy.com/how-to/configure-wireguard-opnsense/)
WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha's. The gotcha's occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home's Internet connection.
WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.
The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.
News Roundup
NomadBSD 1.3.1 (https://nomadbsd.org/index.html#1.3.1)
NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.
GhostBSD 20.02 (https://ghostbsd.org/20.02_release_announcement)
Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.
New FuryBSD XFCE and KDE images (https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/)
This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.
pf-badhost 0.3 Released (https://www.geoghegan.ca/pfbadhost.html)
pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet's biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.
Beastie Bits
DragonFly i915 drm update (https://www.dragonflydigest.com/2020/03/23/24324.html)
CShell is punk rock (http://blog.snailtext.com/posts/cshell-is-punk-rock.html)
The most surprising Unix programs (https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html)
Feedback/Questions
Master One - Torn between OpenBSD and FreeBSD (http://dpaste.com/102HKF5#wrap)
Brad - Follow up to Linus ZFS story (http://dpaste.com/1VXQA2Y#wrap)
Filipe Carvalho - Call for Portuguese BSD User Groups (http://dpaste.com/2H7S8YP)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, corona, corona virus, covid-19, foldingathome, folding at home, wireguard, vpn, opnsense, nomadbsd, ghostbsd, furybsd, xfce, kde, pf, pf-badhost </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/" rel="nofollow">Fighting the Coronavirus with FreeBSD</a></h3>

<blockquote>
<p>Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.</p>

<p>UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.</p>

<p>Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.</p>
</blockquote>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/configure-wireguard-opnsense/" rel="nofollow">How to configure the Wireguard VPN in OPNsense</a></h3>

<blockquote>
<p>WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha&#39;s. The gotcha&#39;s occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home&#39;s Internet connection.</p>

<p>WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.</p>

<p>The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nomadbsd.org/index.html#1.3.1" rel="nofollow">NomadBSD 1.3.1</a></h3>

<blockquote>
<p>NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.</p>
</blockquote>

<hr>

<h3><a href="https://ghostbsd.org/20.02_release_announcement" rel="nofollow">GhostBSD 20.02</a></h3>

<blockquote>
<p>Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.</p>
</blockquote>

<hr>

<h3><a href="https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/" rel="nofollow">New FuryBSD XFCE and KDE images</a></h3>

<blockquote>
<p>This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.</p>
</blockquote>

<hr>

<h3><a href="https://www.geoghegan.ca/pfbadhost.html" rel="nofollow">pf-badhost 0.3 Released</a></h3>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet&#39;s biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/23/24324.html" rel="nofollow">DragonFly i915 drm update</a></li>
<li><a href="http://blog.snailtext.com/posts/cshell-is-punk-rock.html" rel="nofollow">CShell is punk rock</a></li>
<li><a href="https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html" rel="nofollow">The most surprising Unix programs</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Master One - <a href="http://dpaste.com/102HKF5#wrap" rel="nofollow">Torn between OpenBSD and FreeBSD</a></li>
<li>Brad - <a href="http://dpaste.com/1VXQA2Y#wrap" rel="nofollow">Follow up to Linus ZFS story</a></li>
<li>Filipe Carvalho - <a href="http://dpaste.com/2H7S8YP" rel="nofollow">Call for Portuguese BSD User Groups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0343.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Fighting the Coronavirus with FreeBSD, Wireguard VPN Howto in OPNsense, NomadBSD 1.3.1 available, fresh GhostBSD 20.02, New FuryBSD XFCE and KDE images, pf-badhost 0.3 released, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.leidinger.net/blog/2020/03/19/fighting-the-coronavirus-with-freebsd-foldinghome/" rel="nofollow">Fighting the Coronavirus with FreeBSD</a></h3>

<blockquote>
<p>Here is a quick HOWTO for those who want to provide some FreeBSD based compute resources to help finding vaccines.</p>

<p>UPDATE 2020-03-22: 0mp@ made a port out of this, it is in “biology/linux-foldingathome”.</p>

<p>Per default it will now pick up some SARS-CoV‑2 (COVID-19) related folding tasks. There are some more config options (e.g. how much of the system resources are used). Please refer to the official Folding@Home site for more information about that. Be also aware that there is a big rise in compute resources donated to Folding@Home, so the pool of available work units may be empty from time to time, but they are working on adding more work units. Be patient.</p>
</blockquote>

<hr>

<h3><a href="https://homenetworkguy.com/how-to/configure-wireguard-opnsense/" rel="nofollow">How to configure the Wireguard VPN in OPNsense</a></h3>

<blockquote>
<p>WireGuard is a modern designed VPN that uses the latest cryptography for stronger security, is very lightweight, and is relatively easy to set up (mostly). I say ‘mostly’ because I found setting up WireGuard in OPNsense to be more difficult than I anticipated. The basic setup of the WireGuard VPN itself was as easy as the authors claim on their website, but I came across a few gotcha&#39;s. The gotcha&#39;s occur with functionality that is beyond the scope of the WireGuard protocol so I cannot fault them for that. My greatest struggle was configuring WireGuard to function similarly to my OpenVPN server. I want the ability to connect remotely to my home network from my iPhone or iPad, tunnel all traffic through the VPN, have access to certain devices and services on my network, and have the VPN devices use my home&#39;s Internet connection.</p>

<p>WireGuard behaves more like a SSH server than a typical VPN server. With WireGuard, devices which have shared their cryptographic keys with each other are able to connect via an encrypted tunnel (like a SSH server configured to use keys instead of passwords). The devices that are connecting to one another are referred to as “peer” devices. When the peer device is an OPNsense router with WireGuard installed, for instance, it can be configured to allow access to various resources on your network. It becomes a tunnel into your network similar to OpenVPN (with the appropriate firewall rules enabled). I will refer to the WireGuard installation on OPNsense as the server rather than a “peer” to make it more clear which device I am configuring unless I am describing the user interface because that is the terminology used interchangeably by WireGuard.</p>

<p>The documentation I found on WireGuard in OPNsense is straightforward and relatively easy to understand, but I had to wrestle with it for a little while to gain a better understanding on how it should be configured. I believe it was partially due to differing end goals – I was trying to achieve something a little different than the authors of other wiki/blog/forum posts. Piecing together various sources of information, I finally ended up with a configuration that met the goals stated above.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nomadbsd.org/index.html#1.3.1" rel="nofollow">NomadBSD 1.3.1</a></h3>

<blockquote>
<p>NomadBSD 1.3.1 has recently been made available. NomadBSD is a lightweight and portable FreeBSD distribution, designed to run on live on a USB flash drive, allowing you to plug, test, and play on different hardware. They have also started a forum as of yesterday, where you can ask questions and mingle with the NomadBSD community. Notable changes in 1.3.1 are base system upgraded to FreeBSD 12.1-p2. automatic network interface setup improved, image size increased to over 4GB, Thunderbird, Zeroconf, and some more listed below.</p>
</blockquote>

<hr>

<h3><a href="https://ghostbsd.org/20.02_release_announcement" rel="nofollow">GhostBSD 20.02</a></h3>

<blockquote>
<p>Eric Turgeon, main developer of GhostBSD, has announced version 20.02 of the FreeBSD based operating system. Notable changes are ZFS partition into the custom partition editor installer, allowing you to install alongside with Windows, Linux, or macOS. Other changes are force upgrade all packages on system upgrade, improved update station, and powerd by default for laptop battery performance.</p>
</blockquote>

<hr>

<h3><a href="https://www.furybsd.org/new-furybsd-12-1-based-images-are-available-for-xfce-and-kde/" rel="nofollow">New FuryBSD XFCE and KDE images</a></h3>

<blockquote>
<p>This new release is now based on FreeBSD 12.1 with the latest FreeBSD quarterly packages. This brings XFCE up to 4.14, and KDE up to 5.17. In addition to updates this new ISO mostly addresses community bugs, community enhancement requests, and community pull requests. Due to the overwhelming amount of reports with GitHub hosting all new releases are now being pushed to SourceForge only for the time being. Previous releases will still be kept for archive purposes.</p>
</blockquote>

<hr>

<h3><a href="https://www.geoghegan.ca/pfbadhost.html" rel="nofollow">pf-badhost 0.3 Released</a></h3>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet&#39;s biggest irritants. Annoyances such as SSH and SMTP bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/03/23/24324.html" rel="nofollow">DragonFly i915 drm update</a></li>
<li><a href="http://blog.snailtext.com/posts/cshell-is-punk-rock.html" rel="nofollow">CShell is punk rock</a></li>
<li><a href="https://minnie.tuhs.org/pipermail/tuhs/2020-March/020664.html" rel="nofollow">The most surprising Unix programs</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Master One - <a href="http://dpaste.com/102HKF5#wrap" rel="nofollow">Torn between OpenBSD and FreeBSD</a></li>
<li>Brad - <a href="http://dpaste.com/1VXQA2Y#wrap" rel="nofollow">Follow up to Linus ZFS story</a></li>
<li>Filipe Carvalho - <a href="http://dpaste.com/2H7S8YP" rel="nofollow">Call for Portuguese BSD User Groups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0343.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>322: Happy Birthday, Unix</title>
  <link>https://www.bsdnow.tv/322</link>
  <guid isPermaLink="false">9f37f100-02f4-4b71-9eeb-3e9fa09f147c</guid>
  <pubDate>Thu, 31 Oct 2019 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9f37f100-02f4-4b71-9eeb-3e9fa09f147c.mp3" length="49383869" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Unix is 50, Hunting down Ken's PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</itunes:subtitle>
  <itunes:duration>1:07:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Unix is 50, Hunting down Ken's PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.
Headlines
Unix is 50 (https://www.bell-labs.com/unix50/)
In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more "portable". Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.
Hunting down Ken's PDP-7: video footage found (https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html)
In my prior blog post, I traced Ken's scrounged PDP-7 to SN 34. In this post I'll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.
News Roundup
OpenBSD 6.6 Released (https://openbsd.org/66.html)
Announce: https://marc.info/?l=openbsd-tech&amp;amp;m=157132024225971&amp;amp;w=2
Upgrade Guide: https://openbsd.org/faq/upgrade66.html
Changelog: https://openbsd.org/plus66.html
OPNsense 19.7.5 released (https://opnsense.org/opnsense-19-7-5-released/)
Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version
12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.
Here are the full patch notes:
 + system: show all swap partitions in system information widget
 + system: flatten services_get() in preparation for removal
 + system: pin Syslog-ng version to specific package name
 + system: fix LDAP/StartTLS with user import page
 + system: fix a PHP warning on authentication server page
 + system: replace most subprocess.call use
 + interfaces: fix devd handling of carp devices (contributed by stumbaumr)
 + firewall: improve firewall rules inline toggles
 + firewall: only allow TCP flags on TCP protocol
 + firewall: simplify help text for direction setting
 + firewall: make protocol log summary case insensitive
 + reporting: ignore malformed flow records
 + captive portal: fix type mismatch for timeout read
 + dhcp: add note for static lease limitation with lease registration (contributed by Northguy)
 + ipsec: add margintime and rekeyfuzz options
 + ipsec: clear $dpdline correctly if not set
 + ui: fix tokenizer reorder on multiple saves
 + plugins: os-acme-client 1.26[1]
 + plugins: os-bind will reload bind on record change (contributed by blablup)
 + plugins: os-etpro-telemetry minor subprocess.call replacement
 + plugins: os-freeradius 1.9.4[2]
 + plugins: os-frr 1.12[3]
 + plugins: os-haproxy 2.19[4]
 + plugins: os-mailtrail 1.2[5]
 + plugins: os-postfix 1.11[6]
 + plugins: os-rspamd 1.8[7]
 + plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)
 + plugins: os-telegraf 1.7.6[8]
 + plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)
 + plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)
 + plugins: os-tinc minor subprocess.call replacement
 + plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)
 + plugins: os-virtualbox 1.0 (contributed by andrewhotlab)
Dealing with the misunderstandings of what is GhostBSD (http://ghostbsd.org/node/194)
Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package's system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.
Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.
There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram https://t.me/ghostbsd, but you can also reach us on the forum.
SHUTTLE – VPN over SSH | VPN Alternative (https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/)
Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.
VPN over SSH – sshuttle
sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.
OpenSSH 8.1 Released (http://www.openssh.com/txt/release-8.1)
Security
ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam's SSD program.
ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large "prekey" consisting of random data (currently 16KB).
This release includes a number of changes that may affect existing configurations:
ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using "ssh-keygen -t ssh-rsa -s ...").
New Features
ssh(1): Allow %n to be expanded in ProxyCommand strings
ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the '^' character, E.g. "HostKeyAlgorithms ^ssh-ed25519"
ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).
ssh-keygen(1): print key comment when extracting public key from a private key.
ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. "ssh-keygen -vF host") to print the matching host's random-art signature too.
All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM's.
Beastie Bits
Say goodbye to the 32 CPU limit in NetBSD/aarch64 (https://twitter.com/jmcwhatever/status/1185584719183962112)
vBSDcon 2019 videos (https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos)
Browse the web in the terminal - W3M (https://www.youtube.com/watch?v=3Hfda0Tjqsg&amp;amp;feature=youtu.be)
NetBSD 9 and GSoC (http://netbsd.org/~kamil/GSoC2019.html#slide1)
BSDCan 2019 Videos (https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv)
NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders (https://www.nycbug.org/index?action=view&amp;amp;id=10673)
FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open (https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/)
FOSDEM 2020 - BSD Devroom Call for Participation (https://people.freebsd.org/~rodrigo/fosdem20/)
University of Cambridge looking for Research Assistants/Associates (https://twitter.com/ed_maste/status/1184865668317007874)
Feedback/Questions
Trenton - Beeping Thinkpad (http://dpaste.com/0ZEXNM6#wrap)
Alex - Per user ZFS Datasets (http://dpaste.com/1K31A65#wrap)
Allan’s old patch from 2015 (https://reviews.freebsd.org/D2272)
Javier - FBSD 12.0 + ZFS + encryption (http://dpaste.com/1XX4NNA#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, unix, 50 years unix, pdp 7, pdp, release, opnsense, ghostbsd, sshuttle, vpn, ssh, vpn over ssh, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Unix is 50, Hunting down Ken&#39;s PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.bell-labs.com/unix50/" rel="nofollow">Unix is 50</a></h3>

<blockquote>
<p>In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more &quot;portable&quot;. Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.</p>
</blockquote>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html" rel="nofollow">Hunting down Ken&#39;s PDP-7: video footage found</a></h3>

<blockquote>
<p>In my prior blog post, I traced Ken&#39;s scrounged PDP-7 to SN 34. In this post I&#39;ll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://openbsd.org/66.html" rel="nofollow">OpenBSD 6.6 Released</a></h3>

<ul>
<li>Announce: <a href="https://marc.info/?l=openbsd-tech&m=157132024225971&w=2" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=157132024225971&amp;w=2</a></li>
<li>Upgrade Guide: <a href="https://openbsd.org/faq/upgrade66.html" rel="nofollow">https://openbsd.org/faq/upgrade66.html</a></li>
<li>Changelog: <a href="https://openbsd.org/plus66.html" rel="nofollow">https://openbsd.org/plus66.html</a></li>
</ul>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-5-released/" rel="nofollow">OPNsense 19.7.5 released</a></h3>

<blockquote>
<p>Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version</p>
</blockquote>

<p>12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.</p>

<p>Here are the full patch notes:</p>

<ul>
<li>system: show all swap partitions in system information widget</li>
<li>system: flatten services_get() in preparation for removal</li>
<li>system: pin Syslog-ng version to specific package name</li>
<li>system: fix LDAP/StartTLS with user import page</li>
<li>system: fix a PHP warning on authentication server page</li>
<li>system: replace most subprocess.call use</li>
<li>interfaces: fix devd handling of carp devices (contributed by stumbaumr)</li>
<li>firewall: improve firewall rules inline toggles</li>
<li>firewall: only allow TCP flags on TCP protocol</li>
<li>firewall: simplify help text for direction setting</li>
<li>firewall: make protocol log summary case insensitive</li>
<li>reporting: ignore malformed flow records</li>
<li>captive portal: fix type mismatch for timeout read</li>
<li>dhcp: add note for static lease limitation with lease registration (contributed by Northguy)</li>
<li>ipsec: add margintime and rekeyfuzz options</li>
<li>ipsec: clear $dpdline correctly if not set</li>
<li>ui: fix tokenizer reorder on multiple saves</li>
<li>plugins: os-acme-client 1.26[1]</li>
<li>plugins: os-bind will reload bind on record change (contributed by blablup)</li>
<li>plugins: os-etpro-telemetry minor subprocess.call replacement</li>
<li>plugins: os-freeradius 1.9.4[2]</li>
<li>plugins: os-frr 1.12[3]</li>
<li>plugins: os-haproxy 2.19[4]</li>
<li>plugins: os-mailtrail 1.2[5]</li>
<li>plugins: os-postfix 1.11[6]</li>
<li>plugins: os-rspamd 1.8[7]</li>
<li>plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)</li>
<li>plugins: os-telegraf 1.7.6[8]</li>
<li>plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-tinc minor subprocess.call replacement</li>
<li>plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)</li>
<li>plugins: os-virtualbox 1.0 (contributed by andrewhotlab)</li>
</ul>

<hr>

<h3><a href="http://ghostbsd.org/node/194" rel="nofollow">Dealing with the misunderstandings of what is GhostBSD</a></h3>

<blockquote>
<p>Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package&#39;s system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.</p>

<p>Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.</p>

<p>There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram <a href="https://t.me/ghostbsd" rel="nofollow">https://t.me/ghostbsd</a>, but you can also reach us on the forum.</p>
</blockquote>

<hr>

<h3><a href="https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/" rel="nofollow">SHUTTLE – VPN over SSH | VPN Alternative</a></h3>

<blockquote>
<p>Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.</p>
</blockquote>

<ul>
<li>VPN over SSH – sshuttle</li>
</ul>

<blockquote>
<p>sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.1" rel="nofollow">OpenSSH 8.1 Released</a></h3>

<ul>
<li><p>Security</p>

<ul>
<li>ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam&#39;s SSD program.</li>
<li>ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large &quot;prekey&quot; consisting of random data (currently 16KB).</li>
</ul></li>
<li><p>This release includes a number of changes that may affect existing configurations:</p>

<ul>
<li>ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using &quot;ssh-keygen -t ssh-rsa -s ...&quot;).</li>
</ul></li>
<li><p>New Features</p>

<ul>
<li>ssh(1): Allow %n to be expanded in ProxyCommand strings</li>
<li>ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the &#39;<sup>&#39;</sup> character, E.g. &quot;HostKeyAlgorithms <sup>ssh-ed25519&quot;</sup></li>
<li>ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).</li>
<li>ssh-keygen(1): print key comment when extracting public key from a private key.</li>
<li>ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. &quot;ssh-keygen -vF host&quot;) to print the matching host&#39;s random-art signature too.</li>
<li>All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM&#39;s.</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/jmcwhatever/status/1185584719183962112" rel="nofollow">Say goodbye to the 32 CPU limit in NetBSD/aarch64</a></li>
<li><a href="https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos" rel="nofollow">vBSDcon 2019 videos</a></li>
<li><a href="https://www.youtube.com/watch?v=3Hfda0Tjqsg&feature=youtu.be" rel="nofollow">Browse the web in the terminal - W3M</a></li>
<li><a href="http://netbsd.org/%7Ekamil/GSoC2019.html#slide1" rel="nofollow">NetBSD 9 and GSoC</a></li>
<li><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv" rel="nofollow">BSDCan 2019 Videos</a></li>
<li><a href="https://www.nycbug.org/index?action=view&id=10673" rel="nofollow">NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/" rel="nofollow">FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open</a></li>
<li><a href="https://people.freebsd.org/%7Erodrigo/fosdem20/" rel="nofollow">FOSDEM 2020 - BSD Devroom Call for Participation</a></li>
<li><a href="https://twitter.com/ed_maste/status/1184865668317007874" rel="nofollow">University of Cambridge looking for Research Assistants/Associates</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Trenton - <a href="http://dpaste.com/0ZEXNM6#wrap" rel="nofollow">Beeping Thinkpad</a></li>
<li>Alex - <a href="http://dpaste.com/1K31A65#wrap" rel="nofollow">Per user ZFS Datasets</a>

<ul>
<li><a href="https://reviews.freebsd.org/D2272" rel="nofollow">Allan’s old patch from 2015</a></li>
</ul></li>
<li>Javier - <a href="http://dpaste.com/1XX4NNA#wrap" rel="nofollow">FBSD 12.0 + ZFS + encryption</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0322.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Unix is 50, Hunting down Ken&#39;s PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.bell-labs.com/unix50/" rel="nofollow">Unix is 50</a></h3>

<blockquote>
<p>In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more &quot;portable&quot;. Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.</p>
</blockquote>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html" rel="nofollow">Hunting down Ken&#39;s PDP-7: video footage found</a></h3>

<blockquote>
<p>In my prior blog post, I traced Ken&#39;s scrounged PDP-7 to SN 34. In this post I&#39;ll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://openbsd.org/66.html" rel="nofollow">OpenBSD 6.6 Released</a></h3>

<ul>
<li>Announce: <a href="https://marc.info/?l=openbsd-tech&m=157132024225971&w=2" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=157132024225971&amp;w=2</a></li>
<li>Upgrade Guide: <a href="https://openbsd.org/faq/upgrade66.html" rel="nofollow">https://openbsd.org/faq/upgrade66.html</a></li>
<li>Changelog: <a href="https://openbsd.org/plus66.html" rel="nofollow">https://openbsd.org/plus66.html</a></li>
</ul>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-5-released/" rel="nofollow">OPNsense 19.7.5 released</a></h3>

<blockquote>
<p>Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version</p>
</blockquote>

<p>12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.</p>

<p>Here are the full patch notes:</p>

<ul>
<li>system: show all swap partitions in system information widget</li>
<li>system: flatten services_get() in preparation for removal</li>
<li>system: pin Syslog-ng version to specific package name</li>
<li>system: fix LDAP/StartTLS with user import page</li>
<li>system: fix a PHP warning on authentication server page</li>
<li>system: replace most subprocess.call use</li>
<li>interfaces: fix devd handling of carp devices (contributed by stumbaumr)</li>
<li>firewall: improve firewall rules inline toggles</li>
<li>firewall: only allow TCP flags on TCP protocol</li>
<li>firewall: simplify help text for direction setting</li>
<li>firewall: make protocol log summary case insensitive</li>
<li>reporting: ignore malformed flow records</li>
<li>captive portal: fix type mismatch for timeout read</li>
<li>dhcp: add note for static lease limitation with lease registration (contributed by Northguy)</li>
<li>ipsec: add margintime and rekeyfuzz options</li>
<li>ipsec: clear $dpdline correctly if not set</li>
<li>ui: fix tokenizer reorder on multiple saves</li>
<li>plugins: os-acme-client 1.26[1]</li>
<li>plugins: os-bind will reload bind on record change (contributed by blablup)</li>
<li>plugins: os-etpro-telemetry minor subprocess.call replacement</li>
<li>plugins: os-freeradius 1.9.4[2]</li>
<li>plugins: os-frr 1.12[3]</li>
<li>plugins: os-haproxy 2.19[4]</li>
<li>plugins: os-mailtrail 1.2[5]</li>
<li>plugins: os-postfix 1.11[6]</li>
<li>plugins: os-rspamd 1.8[7]</li>
<li>plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)</li>
<li>plugins: os-telegraf 1.7.6[8]</li>
<li>plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-tinc minor subprocess.call replacement</li>
<li>plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)</li>
<li>plugins: os-virtualbox 1.0 (contributed by andrewhotlab)</li>
</ul>

<hr>

<h3><a href="http://ghostbsd.org/node/194" rel="nofollow">Dealing with the misunderstandings of what is GhostBSD</a></h3>

<blockquote>
<p>Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package&#39;s system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.</p>

<p>Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.</p>

<p>There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram <a href="https://t.me/ghostbsd" rel="nofollow">https://t.me/ghostbsd</a>, but you can also reach us on the forum.</p>
</blockquote>

<hr>

<h3><a href="https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/" rel="nofollow">SHUTTLE – VPN over SSH | VPN Alternative</a></h3>

<blockquote>
<p>Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.</p>
</blockquote>

<ul>
<li>VPN over SSH – sshuttle</li>
</ul>

<blockquote>
<p>sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.1" rel="nofollow">OpenSSH 8.1 Released</a></h3>

<ul>
<li><p>Security</p>

<ul>
<li>ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam&#39;s SSD program.</li>
<li>ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large &quot;prekey&quot; consisting of random data (currently 16KB).</li>
</ul></li>
<li><p>This release includes a number of changes that may affect existing configurations:</p>

<ul>
<li>ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using &quot;ssh-keygen -t ssh-rsa -s ...&quot;).</li>
</ul></li>
<li><p>New Features</p>

<ul>
<li>ssh(1): Allow %n to be expanded in ProxyCommand strings</li>
<li>ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the &#39;<sup>&#39;</sup> character, E.g. &quot;HostKeyAlgorithms <sup>ssh-ed25519&quot;</sup></li>
<li>ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).</li>
<li>ssh-keygen(1): print key comment when extracting public key from a private key.</li>
<li>ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. &quot;ssh-keygen -vF host&quot;) to print the matching host&#39;s random-art signature too.</li>
<li>All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM&#39;s.</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/jmcwhatever/status/1185584719183962112" rel="nofollow">Say goodbye to the 32 CPU limit in NetBSD/aarch64</a></li>
<li><a href="https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos" rel="nofollow">vBSDcon 2019 videos</a></li>
<li><a href="https://www.youtube.com/watch?v=3Hfda0Tjqsg&feature=youtu.be" rel="nofollow">Browse the web in the terminal - W3M</a></li>
<li><a href="http://netbsd.org/%7Ekamil/GSoC2019.html#slide1" rel="nofollow">NetBSD 9 and GSoC</a></li>
<li><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv" rel="nofollow">BSDCan 2019 Videos</a></li>
<li><a href="https://www.nycbug.org/index?action=view&id=10673" rel="nofollow">NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/" rel="nofollow">FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open</a></li>
<li><a href="https://people.freebsd.org/%7Erodrigo/fosdem20/" rel="nofollow">FOSDEM 2020 - BSD Devroom Call for Participation</a></li>
<li><a href="https://twitter.com/ed_maste/status/1184865668317007874" rel="nofollow">University of Cambridge looking for Research Assistants/Associates</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Trenton - <a href="http://dpaste.com/0ZEXNM6#wrap" rel="nofollow">Beeping Thinkpad</a></li>
<li>Alex - <a href="http://dpaste.com/1K31A65#wrap" rel="nofollow">Per user ZFS Datasets</a>

<ul>
<li><a href="https://reviews.freebsd.org/D2272" rel="nofollow">Allan’s old patch from 2015</a></li>
</ul></li>
<li>Javier - <a href="http://dpaste.com/1XX4NNA#wrap" rel="nofollow">FBSD 12.0 + ZFS + encryption</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0322.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 270: Ghostly Releases | BSD Now 270</title>
  <link>https://www.bsdnow.tv/270</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2822</guid>
  <pubDate>Thu, 01 Nov 2018 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/83e21562-2f8c-4810-b4c6-0e8f3e36f95b.mp3" length="41653876" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</itunes:subtitle>
  <itunes:duration>1:09:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.
&lt;p&gt;##Headlines&lt;br&gt;
&lt;a href="https://www.openbsd.org/64.html"&gt;OpenBSD 6.4 released&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/plus64.html"&gt;See a detailed log of changes between the 6.3 and 6.4 releases.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/ftp.html"&gt;See the information on the FTP page for a list of mirror machines.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/errata64.html"&gt;Have a look at the 6.4 errata page for a list of bugs and workarounds.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;signify(1) pubkeys for this release:&lt;/li&gt;
&lt;li&gt;base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA&lt;/li&gt;
&lt;li&gt;fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97&lt;/li&gt;
&lt;li&gt;pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://www.ghostbsd.org/18.10_RC2_release_announcement"&gt;GhostBSD 18.10 RC2 Announced&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;What has changed since RC1&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Issues that got fixed&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #70 Cannot run Octopi, missing libgksu error.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #72 libarchive is a missing dependency&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Updating from RC1 to RC2:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg update -f&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg install -f libarchive curl libgksu&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg upgrade&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Where to download:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;All images checksum, hybrid ISO(DVD, USB) and torrent are available here: &lt;a href="https://www.ghostbsd.org/download"&gt;https://www.ghostbsd.org/download&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;[ScreenShots]&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png"&gt;https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-2013-22-41.png&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-2013-27-26.png"&gt;https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-20_13-27-26.png&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://www.openssh.com/txt/release-7.9"&gt;OpenSSH 7.9 has been released and it has support for OpenSSL 1.1&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Changes since OpenSSH 7.8
This is primarily a bugfix release.
New Features
ssh(1), sshd(8): allow most port numbers to be specified using
service names from getservbyname(3) (typically /etc/services).
ssh(1): allow the IdentityAgent configuration directive to accept
environment variable names. This supports the use of multiple
agent sockets without needing to use fixed paths.
sshd(8): support signalling sessions via the SSH protocol.
A limited subset of signals is supported and only for login or
command sessions (i.e. not subsystems) that were not subject to
a forced command via authorizedkeys or sshdconfig. bz#1424
ssh(1): support "ssh -Q sig" to list supported signature options.
Also "ssh -Q help" to show the full set of supported queries.
ssh(1), sshd(8): add a CASignatureAlgorithms option for the
client and server configs to allow control over which signature
formats are allowed for CAs to sign certificates. For example,
this allows banning CAs that sign certificates using the RSA-SHA1
signature algorithm.
sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
revoke keys specified by SHA256 hash.
ssh-keygen(1): allow creation of key revocation lists directly
from base64-encoded SHA256 fingerprints. This supports revoking
keys using only the information contained in sshd(8)
authentication log messages.
Bugfixes
ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when
attempting to load PEM private keys while using an incorrect
passphrase. bz#2901
sshd(8): when a channel closed message is received from a client,
close the stderr file descriptor at the same time stdout is
closed. This avoids stuck processes if they were waiting for
stderr to close and were insensitive to stdin/out closing. bz#2863
ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
forwarding timeout and support X11 forwarding indefinitely.
Previously the behaviour of ForwardX11Timeout=0 was undefined.
sshd(8): when compiled with GSSAPI support, cache supported method
OIDs regardless of whether GSSAPI authentication is enabled in the
main section of sshd_config. This avoids sandbox violations if
GSSAPI authentication was later enabled in a Match block. bz#2107
sshd(8): do not fail closed when configured with a text key
revocation list that contains a too-short key. bz#2897
ssh(1): treat connections with ProxyJump specified the same as
ones with a ProxyCommand set with regards to hostname
canonicalisation (i.e. don't try to canonicalise the hostname
unless CanonicalizeHostname is set to 'always'). bz#2896
ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
key authentication using certificates hosted in a ssh-agent(1)
or against sshd(8) from OpenSSH &amp;lt;7.8.
Portability
All: support building against the openssl-1.1 API (releases 1.1.0g
and later). The openssl-1.0 API will remain supported at least
until OpenSSL terminates security patch support for that API version.
sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
apparently required by some glibc/OpenSSL combinations.
sshd(8): handle getgrouplist(3) returning more than
SCNGROUPSMAX groups. Some platforms consider this limit more
as a guideline.
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;/p&gt;
&lt;p&gt;###&lt;a href="https://www.ixsystems.com/blog/meetbsd-2018/"&gt;MeetBSD 2018: The Ultimate Hallway Track&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 0&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 1&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp;amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 2&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Putting the “meet” in MeetBSD&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;See you at MeetBSD 2020!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/"&gt;Setup DragonflyBSD with a desktop on real hardware ThinkPad T410&lt;/a&gt;&lt;br&gt;
+&lt;a href="https://youtu.be/p4KwssNY82Q"&gt;Video Demo&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.&lt;br&gt;
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!&lt;br&gt;
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Download image file and burn to USB drive or DVD&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;First installation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Setting up the system and installing a desktop&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Inside the desktop&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install some more programs&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How to enable sound?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Let’s play some free games&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Setup WiFi&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Power mode settings&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;More to do?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;A small summary of what we got on the upside:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Free and open source operating system with a long history&lt;/li&gt;
&lt;li&gt;Drivers worked fine including Ethernet, WiFi, video 2D &amp;amp; 3D, audio, etc&lt;/li&gt;
&lt;li&gt;Hammer2 advanced file system&lt;/li&gt;
&lt;li&gt;You are very unique if you use this OS fork&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Some downsides:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Less driver and direct app support than Linux&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Installer and desktop have some traps and quirks and require work&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html"&gt;Porting Keybase to NetBSD&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!&lt;br&gt;
So, this evening, I tried to get it to all work on NetBSD.&lt;br&gt;
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.&lt;br&gt;
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…&lt;br&gt;
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a&lt;br&gt;
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000//api/1.0/merkle/path.json?last=3784314&amp;amp;loaddeleted=1&amp;amp;loadresetchain=1&amp;amp;poll=10&amp;amp;sighints_low=3&amp;amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;There’s a few things about this error message that stuck out to me:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Forking a background server? What?&lt;/li&gt;
&lt;li&gt;It’s trying to connect to localhost? That must be the server that doesn’t work …&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ps 12932
PID TTY STAT    TIME COMMAND
12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
/home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
/home/charlotte/.config/keybase.devel --auto-forked 
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
--standalone                         Use the client without any daemon support.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at &lt;a href="https://keybase.io"&gt;https://keybase.io&lt;/a&gt;?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
--server, -s                         Specify server API.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 
charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ "dressupgeekout" on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ "dressupgeekout" on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/mykeybaseproof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=339929"&gt;Initial implementation of draft-ietf-6man-ipv6only-flag&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This change defines the RA "6" (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.
If all routers agree that it is an IPv6-only link, etheroutputframe(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.
The change also updates ndp to show the "6" flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.
Further changes to tcpdump (contrib code) are availble and will
be upstreamed.
Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the "6" flag set but not understood).
We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.
All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.
Dear 6man, you have running code.
Discussed with: Bob Hinden, Brian E Carpenter
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/"&gt;Running FreeBSD on macOS via xhyve&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3841"&gt;Auction Winners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md"&gt;OpenSSH Principals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20181018160645"&gt;OpenBSD Foundation gets a second Iridium donation from Handshake&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html"&gt;NetBSD machines at Open Source Conference 2018 Kagawa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3818"&gt;Absolute FreeBSD now shipping!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd"&gt;NextCloud on OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/news/newsflash.html#event20181027:01"&gt;FreeBSD 12.0-BETA2 Available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/gvnn3/status/1049347862541344771"&gt;DTrace on Windows ported from FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/36DFQ1S"&gt;HELBUG fall 2018 meeting scheduled - Thursday the 15th of November&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://translate.google.com/translate?hl=de&amp;amp;sl=de&amp;amp;tl=en&amp;amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F"&gt;35C3 pre-sale has started&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/"&gt;Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsd-pl.org/en"&gt;Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Greg - &lt;a href="http://dpaste.com/1WA54CC"&gt;Interview suggestion for the show&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Nelson - &lt;a href="http://dpaste.com/21KKF7Q#wrap"&gt;Ghostscript vulnerabilities&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Allison - &lt;a href="http://dpaste.com/3K6D7ST"&gt;Ports and GCC&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview,ghostbsd,keybase,openssh,openssl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</p>

<p>##Headlines<br>
###<a href="https://www.openbsd.org/64.html">OpenBSD 6.4 released</a></p>

<ul>
<li><a href="https://www.openbsd.org/plus64.html">See a detailed log of changes between the 6.3 and 6.4 releases.</a></li>
<li><a href="https://www.openbsd.org/ftp.html">See the information on the FTP page for a list of mirror machines.</a></li>
<li><a href="https://www.openbsd.org/errata64.html">Have a look at the 6.4 errata page for a list of bugs and workarounds.</a></li>
<li>signify(1) pubkeys for this release:</li>
<li>base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA</li>
<li>fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97</li>
<li>pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.ghostbsd.org/18.10_RC2_release_announcement">GhostBSD 18.10 RC2 Announced</a></p>

<blockquote>
<p>This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.</p>
</blockquote>

<ul>
<li>
<p>What has changed since RC1</p>
</li>
<li>
<p>Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod</p>
</li>
<li>
<p>Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel</p>
</li>
<li>
<p>Issues that got fixed</p>
</li>
<li>
<p>Bug #70 Cannot run Octopi, missing libgksu error.</p>
</li>
<li>
<p>Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4</p>
</li>
<li>
<p>Bug #72 libarchive is a missing dependency</p>
</li>
</ul>

<blockquote>
<p>Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.</p>
</blockquote>

<ul>
<li>
<p>Updating from RC1 to RC2:</p>
</li>
<li>
<p>sudo pkg update -f</p>
</li>
<li>
<p>sudo pkg install -f libarchive curl libgksu</p>
</li>
<li>
<p>sudo pkg upgrade</p>
</li>
<li>
<p>Where to download:</p>
</li>
<li>
<p>All images checksum, hybrid ISO(DVD, USB) and torrent are available here: <a href="https://www.ghostbsd.org/download">https://www.ghostbsd.org/download</a></p>
</li>
<li>
<p>[ScreenShots]</p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png</a></p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png</a></p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.openssh.com/txt/release-7.9">OpenSSH 7.9 has been released and it has support for OpenSSL 1.1</a></p>

<pre><code>Changes since OpenSSH 7.8
=========================

This is primarily a bugfix release.

New Features
------------
 * ssh(1), sshd(8): allow most port numbers to be specified using
   service names from getservbyname(3) (typically /etc/services).
 * ssh(1): allow the IdentityAgent configuration directive to accept
   environment variable names. This supports the use of multiple
   agent sockets without needing to use fixed paths.
 * sshd(8): support signalling sessions via the SSH protocol.
   A limited subset of signals is supported and only for login or
   command sessions (i.e. not subsystems) that were not subject to
   a forced command via authorized_keys or sshd_config. bz#1424
 * ssh(1): support &quot;ssh -Q sig&quot; to list supported signature options.
   Also &quot;ssh -Q help&quot; to show the full set of supported queries.
 * ssh(1), sshd(8): add a CASignatureAlgorithms option for the
   client and server configs to allow control over which signature
   formats are allowed for CAs to sign certificates. For example,
   this allows banning CAs that sign certificates using the RSA-SHA1
   signature algorithm.
 * sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
   revoke keys specified by SHA256 hash.
 * ssh-keygen(1): allow creation of key revocation lists directly
   from base64-encoded SHA256 fingerprints. This supports revoking
   keys using only the information contained in sshd(8)
   authentication log messages.

Bugfixes
--------

 * ssh(1), ssh-keygen(1): avoid spurious &quot;invalid format&quot; errors when
   attempting to load PEM private keys while using an incorrect
   passphrase. bz#2901
 * sshd(8): when a channel closed message is received from a client,
   close the stderr file descriptor at the same time stdout is
   closed. This avoids stuck processes if they were waiting for
   stderr to close and were insensitive to stdin/out closing. bz#2863
 * ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
   forwarding timeout and support X11 forwarding indefinitely.
   Previously the behaviour of ForwardX11Timeout=0 was undefined.
 * sshd(8): when compiled with GSSAPI support, cache supported method
   OIDs regardless of whether GSSAPI authentication is enabled in the
   main section of sshd_config. This avoids sandbox violations if
   GSSAPI authentication was later enabled in a Match block. bz#2107
 * sshd(8): do not fail closed when configured with a text key
   revocation list that contains a too-short key. bz#2897
 * ssh(1): treat connections with ProxyJump specified the same as
   ones with a ProxyCommand set with regards to hostname
   canonicalisation (i.e. don't try to canonicalise the hostname
   unless CanonicalizeHostname is set to 'always'). bz#2896
 * ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
   key authentication using certificates hosted in a ssh-agent(1)
   or against sshd(8) from OpenSSH &lt;7.8.

Portability
-----------

 * All: support building against the openssl-1.1 API (releases 1.1.0g
   and later). The openssl-1.0 API will remain supported at least
   until OpenSSL terminates security patch support for that API version.
 * sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
   apparently required by some glibc/OpenSSL combinations.
 * sshd(8): handle getgrouplist(3) returning more than
   _SC_NGROUPS_MAX groups. Some platforms consider this limit more
   as a guideline.
</code></pre>

<p><hr></p>

<p>##News Roundup</p>

<p>###<a href="https://www.ixsystems.com/blog/meetbsd-2018/">MeetBSD 2018: The Ultimate Hallway Track</a></p>

<blockquote>
<p>Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.</p>
</blockquote>

<ul>
<li>MeetBSD Day 0</li>
</ul>

<blockquote>
<p>Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.</p>
</blockquote>

<ul>
<li>MeetBSD Day 1</li>
</ul>

<blockquote>
<p>The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.</p>
</blockquote>

<ul>
<li>MeetBSD Day 2</li>
</ul>

<blockquote>
<p>Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.</p>
</blockquote>

<ul>
<li>Putting the “meet” in MeetBSD</li>
</ul>

<blockquote>
<p>I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.</p>
</blockquote>

<blockquote>
<p>See you at MeetBSD 2020!</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/">Setup DragonflyBSD with a desktop on real hardware ThinkPad T410</a><br>
+<a href="https://youtu.be/p4KwssNY82Q">Video Demo</a></p>

<blockquote>
<p>Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.<br>
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!<br>
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.</p>
</blockquote>

<ul>
<li>
<p>Download image file and burn to USB drive or DVD</p>
</li>
<li>
<p>First installation</p>
</li>
<li>
<p>Setting up the system and installing a desktop</p>
</li>
<li>
<p>Inside the desktop</p>
</li>
<li>
<p>Install some more programs</p>
</li>
<li>
<p>How to enable sound?</p>
</li>
<li>
<p>Let’s play some free games</p>
</li>
<li>
<p>Setup WiFi</p>
</li>
<li>
<p>Power mode settings</p>
</li>
<li>
<p>More to do?</p>
</li>
</ul>

<blockquote>
<p>You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.</p>
</blockquote>

<ul>
<li>
<p>A small summary of what we got on the upside:</p>
<ul>
<li>Free and open source operating system with a long history</li>
<li>Drivers worked fine including Ethernet, WiFi, video 2D &amp; 3D, audio, etc</li>
<li>Hammer2 advanced file system</li>
<li>You are very unique if you use this OS fork</li>
</ul>

<p></li><br>
<li></p>

<p>Some downsides:</p>

<p></li><br>
<li></p>

<p>Less driver and direct app support than Linux</p>

<p></li><br>
<li></p>

<p>Installer and desktop have some traps and quirks and require work</p>

<p></li><br>
</ul><br>
<hr></p>

<p>###<a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html">Porting Keybase to NetBSD</a></p>

<blockquote>
<p>Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!<br>
So, this evening, I tried to get it to all work on NetBSD.<br>
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.<br>
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…<br>
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a<br>
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000/_/api/1.0/merkle/path.json?last=3784314&amp;load_deleted=1&amp;load_reset_chain=1&amp;poll=10&amp;sig_hints_low=3&amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
</code></pre>

<blockquote>
<p>There’s a few things about this error message that stuck out to me:</p>
</blockquote>

<ul>
<li>Forking a background server? What?</li>
<li>It’s trying to connect to localhost? That must be the server that doesn’t work …</li>
</ul>

<blockquote>
<p>Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ps 12932
  PID TTY STAT    TIME COMMAND
  12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
  /home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
  /home/charlotte/.config/keybase.devel --auto-forked 
</code></pre>

<blockquote>
<p>I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
   --standalone                         Use the client without any daemon support.
</code></pre>

<blockquote>
<p>And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at <a href="https://keybase.io">https://keybase.io</a>?</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
   --server, -s                         Specify server API.
</code></pre>

<blockquote>
<p>Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 

charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ &quot;dressupgeekout&quot; on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ &quot;dressupgeekout&quot; on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/my_keybase_proof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
</code></pre>

<p><hr></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=339929">Initial implementation of draft-ietf-6man-ipv6only-flag</a></p>

<pre><code>This change defines the RA &quot;6&quot; (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.

If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.

The change also updates ndp to show the &quot;6&quot; flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.

Further changes to tcpdump (contrib code) are availble and will
be upstreamed.

Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the &quot;6&quot; flag set but not understood).

We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.

All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.

Dear 6man, you have running code.

Discussed with: Bob Hinden, Brian E Carpenter
</code></pre>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/">Running FreeBSD on macOS via xhyve</a></li>
<li><a href="https://mwl.io/archives/3841">Auction Winners</a></li>
<li><a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md">OpenSSH Principals</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181018160645">OpenBSD Foundation gets a second Iridium donation from Handshake</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html">NetBSD machines at Open Source Conference 2018 Kagawa</a></li>
<li><a href="https://mwl.io/archives/3818">Absolute FreeBSD now shipping!</a></li>
<li><a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd">NextCloud on OpenBSD</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20181027:01">FreeBSD 12.0-BETA2 Available</a></li>
<li><a href="https://twitter.com/gvnn3/status/1049347862541344771">DTrace on Windows ported from FreeBSD</a></li>
<li><a href="http://dpaste.com/36DFQ1S">HELBUG fall 2018 meeting scheduled - Thursday the 15th of November</a></li>
<li><a href="https://translate.google.com/translate?hl=de&amp;sl=de&amp;tl=en&amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F">35C3 pre-sale has started</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  </a></li>
<li><a href="https://bsd-pl.org/en">Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 </a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Greg - <a href="http://dpaste.com/1WA54CC">Interview suggestion for the show</a></li>
<li>Nelson - <a href="http://dpaste.com/21KKF7Q#wrap">Ghostscript vulnerabilities</a></li>
<li>Allison - <a href="http://dpaste.com/3K6D7ST">Ports and GCC</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</p>

<p>##Headlines<br>
###<a href="https://www.openbsd.org/64.html">OpenBSD 6.4 released</a></p>

<ul>
<li><a href="https://www.openbsd.org/plus64.html">See a detailed log of changes between the 6.3 and 6.4 releases.</a></li>
<li><a href="https://www.openbsd.org/ftp.html">See the information on the FTP page for a list of mirror machines.</a></li>
<li><a href="https://www.openbsd.org/errata64.html">Have a look at the 6.4 errata page for a list of bugs and workarounds.</a></li>
<li>signify(1) pubkeys for this release:</li>
<li>base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA</li>
<li>fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97</li>
<li>pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.ghostbsd.org/18.10_RC2_release_announcement">GhostBSD 18.10 RC2 Announced</a></p>

<blockquote>
<p>This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.</p>
</blockquote>

<ul>
<li>
<p>What has changed since RC1</p>
</li>
<li>
<p>Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod</p>
</li>
<li>
<p>Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel</p>
</li>
<li>
<p>Issues that got fixed</p>
</li>
<li>
<p>Bug #70 Cannot run Octopi, missing libgksu error.</p>
</li>
<li>
<p>Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4</p>
</li>
<li>
<p>Bug #72 libarchive is a missing dependency</p>
</li>
</ul>

<blockquote>
<p>Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.</p>
</blockquote>

<ul>
<li>
<p>Updating from RC1 to RC2:</p>
</li>
<li>
<p>sudo pkg update -f</p>
</li>
<li>
<p>sudo pkg install -f libarchive curl libgksu</p>
</li>
<li>
<p>sudo pkg upgrade</p>
</li>
<li>
<p>Where to download:</p>
</li>
<li>
<p>All images checksum, hybrid ISO(DVD, USB) and torrent are available here: <a href="https://www.ghostbsd.org/download">https://www.ghostbsd.org/download</a></p>
</li>
<li>
<p>[ScreenShots]</p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png</a></p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png</a></p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.openssh.com/txt/release-7.9">OpenSSH 7.9 has been released and it has support for OpenSSL 1.1</a></p>

<pre><code>Changes since OpenSSH 7.8
=========================

This is primarily a bugfix release.

New Features
------------
 * ssh(1), sshd(8): allow most port numbers to be specified using
   service names from getservbyname(3) (typically /etc/services).
 * ssh(1): allow the IdentityAgent configuration directive to accept
   environment variable names. This supports the use of multiple
   agent sockets without needing to use fixed paths.
 * sshd(8): support signalling sessions via the SSH protocol.
   A limited subset of signals is supported and only for login or
   command sessions (i.e. not subsystems) that were not subject to
   a forced command via authorized_keys or sshd_config. bz#1424
 * ssh(1): support &quot;ssh -Q sig&quot; to list supported signature options.
   Also &quot;ssh -Q help&quot; to show the full set of supported queries.
 * ssh(1), sshd(8): add a CASignatureAlgorithms option for the
   client and server configs to allow control over which signature
   formats are allowed for CAs to sign certificates. For example,
   this allows banning CAs that sign certificates using the RSA-SHA1
   signature algorithm.
 * sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
   revoke keys specified by SHA256 hash.
 * ssh-keygen(1): allow creation of key revocation lists directly
   from base64-encoded SHA256 fingerprints. This supports revoking
   keys using only the information contained in sshd(8)
   authentication log messages.

Bugfixes
--------

 * ssh(1), ssh-keygen(1): avoid spurious &quot;invalid format&quot; errors when
   attempting to load PEM private keys while using an incorrect
   passphrase. bz#2901
 * sshd(8): when a channel closed message is received from a client,
   close the stderr file descriptor at the same time stdout is
   closed. This avoids stuck processes if they were waiting for
   stderr to close and were insensitive to stdin/out closing. bz#2863
 * ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
   forwarding timeout and support X11 forwarding indefinitely.
   Previously the behaviour of ForwardX11Timeout=0 was undefined.
 * sshd(8): when compiled with GSSAPI support, cache supported method
   OIDs regardless of whether GSSAPI authentication is enabled in the
   main section of sshd_config. This avoids sandbox violations if
   GSSAPI authentication was later enabled in a Match block. bz#2107
 * sshd(8): do not fail closed when configured with a text key
   revocation list that contains a too-short key. bz#2897
 * ssh(1): treat connections with ProxyJump specified the same as
   ones with a ProxyCommand set with regards to hostname
   canonicalisation (i.e. don't try to canonicalise the hostname
   unless CanonicalizeHostname is set to 'always'). bz#2896
 * ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
   key authentication using certificates hosted in a ssh-agent(1)
   or against sshd(8) from OpenSSH &lt;7.8.

Portability
-----------

 * All: support building against the openssl-1.1 API (releases 1.1.0g
   and later). The openssl-1.0 API will remain supported at least
   until OpenSSL terminates security patch support for that API version.
 * sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
   apparently required by some glibc/OpenSSL combinations.
 * sshd(8): handle getgrouplist(3) returning more than
   _SC_NGROUPS_MAX groups. Some platforms consider this limit more
   as a guideline.
</code></pre>

<p><hr></p>

<p>##News Roundup</p>

<p>###<a href="https://www.ixsystems.com/blog/meetbsd-2018/">MeetBSD 2018: The Ultimate Hallway Track</a></p>

<blockquote>
<p>Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.</p>
</blockquote>

<ul>
<li>MeetBSD Day 0</li>
</ul>

<blockquote>
<p>Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.</p>
</blockquote>

<ul>
<li>MeetBSD Day 1</li>
</ul>

<blockquote>
<p>The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.</p>
</blockquote>

<ul>
<li>MeetBSD Day 2</li>
</ul>

<blockquote>
<p>Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.</p>
</blockquote>

<ul>
<li>Putting the “meet” in MeetBSD</li>
</ul>

<blockquote>
<p>I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.</p>
</blockquote>

<blockquote>
<p>See you at MeetBSD 2020!</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/">Setup DragonflyBSD with a desktop on real hardware ThinkPad T410</a><br>
+<a href="https://youtu.be/p4KwssNY82Q">Video Demo</a></p>

<blockquote>
<p>Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.<br>
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!<br>
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.</p>
</blockquote>

<ul>
<li>
<p>Download image file and burn to USB drive or DVD</p>
</li>
<li>
<p>First installation</p>
</li>
<li>
<p>Setting up the system and installing a desktop</p>
</li>
<li>
<p>Inside the desktop</p>
</li>
<li>
<p>Install some more programs</p>
</li>
<li>
<p>How to enable sound?</p>
</li>
<li>
<p>Let’s play some free games</p>
</li>
<li>
<p>Setup WiFi</p>
</li>
<li>
<p>Power mode settings</p>
</li>
<li>
<p>More to do?</p>
</li>
</ul>

<blockquote>
<p>You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.</p>
</blockquote>

<ul>
<li>
<p>A small summary of what we got on the upside:</p>
<ul>
<li>Free and open source operating system with a long history</li>
<li>Drivers worked fine including Ethernet, WiFi, video 2D &amp; 3D, audio, etc</li>
<li>Hammer2 advanced file system</li>
<li>You are very unique if you use this OS fork</li>
</ul>

<p></li><br>
<li></p>

<p>Some downsides:</p>

<p></li><br>
<li></p>

<p>Less driver and direct app support than Linux</p>

<p></li><br>
<li></p>

<p>Installer and desktop have some traps and quirks and require work</p>

<p></li><br>
</ul><br>
<hr></p>

<p>###<a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html">Porting Keybase to NetBSD</a></p>

<blockquote>
<p>Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!<br>
So, this evening, I tried to get it to all work on NetBSD.<br>
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.<br>
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…<br>
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a<br>
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000/_/api/1.0/merkle/path.json?last=3784314&amp;load_deleted=1&amp;load_reset_chain=1&amp;poll=10&amp;sig_hints_low=3&amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
</code></pre>

<blockquote>
<p>There’s a few things about this error message that stuck out to me:</p>
</blockquote>

<ul>
<li>Forking a background server? What?</li>
<li>It’s trying to connect to localhost? That must be the server that doesn’t work …</li>
</ul>

<blockquote>
<p>Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ps 12932
  PID TTY STAT    TIME COMMAND
  12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
  /home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
  /home/charlotte/.config/keybase.devel --auto-forked 
</code></pre>

<blockquote>
<p>I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
   --standalone                         Use the client without any daemon support.
</code></pre>

<blockquote>
<p>And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at <a href="https://keybase.io">https://keybase.io</a>?</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
   --server, -s                         Specify server API.
</code></pre>

<blockquote>
<p>Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 

charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ &quot;dressupgeekout&quot; on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ &quot;dressupgeekout&quot; on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/my_keybase_proof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
</code></pre>

<p><hr></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=339929">Initial implementation of draft-ietf-6man-ipv6only-flag</a></p>

<pre><code>This change defines the RA &quot;6&quot; (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.

If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.

The change also updates ndp to show the &quot;6&quot; flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.

Further changes to tcpdump (contrib code) are availble and will
be upstreamed.

Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the &quot;6&quot; flag set but not understood).

We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.

All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.

Dear 6man, you have running code.

Discussed with: Bob Hinden, Brian E Carpenter
</code></pre>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/">Running FreeBSD on macOS via xhyve</a></li>
<li><a href="https://mwl.io/archives/3841">Auction Winners</a></li>
<li><a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md">OpenSSH Principals</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181018160645">OpenBSD Foundation gets a second Iridium donation from Handshake</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html">NetBSD machines at Open Source Conference 2018 Kagawa</a></li>
<li><a href="https://mwl.io/archives/3818">Absolute FreeBSD now shipping!</a></li>
<li><a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd">NextCloud on OpenBSD</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20181027:01">FreeBSD 12.0-BETA2 Available</a></li>
<li><a href="https://twitter.com/gvnn3/status/1049347862541344771">DTrace on Windows ported from FreeBSD</a></li>
<li><a href="http://dpaste.com/36DFQ1S">HELBUG fall 2018 meeting scheduled - Thursday the 15th of November</a></li>
<li><a href="https://translate.google.com/translate?hl=de&amp;sl=de&amp;tl=en&amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F">35C3 pre-sale has started</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  </a></li>
<li><a href="https://bsd-pl.org/en">Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 </a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Greg - <a href="http://dpaste.com/1WA54CC">Interview suggestion for the show</a></li>
<li>Nelson - <a href="http://dpaste.com/21KKF7Q#wrap">Ghostscript vulnerabilities</a></li>
<li>Allison - <a href="http://dpaste.com/3K6D7ST">Ports and GCC</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 269: Tiny Daemon Lib | BSD Now 269</title>
  <link>https://www.bsdnow.tv/269</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2747</guid>
  <pubDate>Wed, 24 Oct 2018 05:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5cd889a3-fdea-4394-a3e4-69aaa37d9ee0.mp3" length="53176544" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Foundation September Update, tiny C lib for programming Unix daemons, EuroBSDcon trip reports, GhostBSD tested on real hardware, and a BSD auth module for duress.</itunes:subtitle>
  <itunes:duration>1:28:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD Foundation September Update, tiny C lib for programming Unix daemons, EuroBSDcon trip reports, GhostBSD tested on real hardware, and a BSD auth module for duress.
&lt;p&gt;##Headlines&lt;br&gt;
&lt;a href="https://www.freebsdfoundation.org/news-and-events/newsletter/freebsd-foundation-update-september-2018/"&gt;FreeBSD Foundation Update, September 2018&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;MESSAGE FROM THE EXECUTIVE DIRECTOR&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Dear FreeBSD Community Member, It is hard to believe that September is over. The Foundation team had a busy month promoting FreeBSD all over the globe, bug fixing in preparation for 12.0, and setting plans in motion to kick off our 4th quarter fundraising and advocacy efforts. Take a minute to see what we’ve been up to and please consider making a donation to help us continue our efforts supporting FreeBSD!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;September 2018 Development Projects Update&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;In preparation for the release of FreeBSD 12.0, I have been working on investigating and fixing a backlog of kernel bug reports.  Of course, this kind of work is never finished, and we will continue to make progress after the release.  In the past couple of months I have fixed a combination of long-standing issues and recent regressions.  Of note are a pair of UNIX domain socket bugs which had been affecting various applications for years.  In particular, Chromium tabs would frequently hang unless a workaround was manually applied to the system, and the bug had started affecting recent versions of Firefox as well.  Fixing these issues gave me an opportunity to revisit and extend our regression testing for UNIX sockets, which, in turn, resulted in some related bugs being identified and fixed.&lt;br&gt;
Of late I have also been investigating reports of issues with ZFS, particularly, those reported on FreeBSD 11.2.  A number of regressions, including a kernel memory leak and issues with ARC reclamation, have already been fixed for 12.0; investigation of other reports is ongoing. Those who closely follow FreeBSD-CURRENT know that some exciting work to improve memory usage on NUMA systems is now enabled by default.  As is usually the case when new code is deployed in a diverse array of systems and workloads, a number of problems since have been identified. We are working on resolving them as soon as possible to ensure the quality of the release.&lt;br&gt;
I’m passionate about maintaining FreeBSD’s stability and dependability as it continues to expand and grow new features, and I’m grateful to the FreeBSD Foundation for sponsoring this work.  We depend on users to report problems to the mailing lists and via the bug tracker, so please try running the 12.0 candidate builds and help us make 12.0 a great release.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Fundraising Update: Supporting the Project&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;It’s officially Fall here at Foundation headquarters and we’re heading full-steam into our final fundraising campaign of the year. We couldn’t even have begun to reach our funding goal of $1.25 million dollars without the support from the companies who have partnered with us this year. Thank you to Verisign for becoming a Silver Partner. They now join a growing list of companies like Xiplink, NetApp, Microsoft, Tarsnap, VMware, and NeoSmart Technologies that are stepping up and showing their commitment to FreeBSD!&lt;br&gt;
Funding from commercial users like these and individual users like yourself, help us continue our efforts of supporting critical areas of FreeBSD such as:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Operating System Improvements: Providing staff to immediately respond to urgent problems and implement new features and functionality allowing for the innovation and stability you’ve come to rely on.&lt;/li&gt;
&lt;li&gt;Security: Providing engineering resources to bolster the capacity and responsiveness of the Security team providing your users with piece of mind when security issues arise.&lt;/li&gt;
&lt;li&gt;Release Engineering: Continue providing a full-time release engineer, resulting in timely and reliable releases you can plan around.&lt;/li&gt;
&lt;li&gt;Quality Assurance: Improving and increasing test coverage, continuous integration, and automated testing with a full-time software engineer to ensure you receive the highest quality, secure, and reliable operating system.&lt;/li&gt;
&lt;li&gt;New User Experience: Improving the process and documentation for getting new people involved with FreeBSD, and supporting those people as they become integrated into the FreeBSD Community providing the resources you may need to get new folks up to speed.&lt;/li&gt;
&lt;li&gt;Training: Supporting more FreeBSD training for undergraduates, graduates, and postgraduates. Growing the community means reaching people and catching their interest in systems software as early as possible and providing you with a bigger pool of candidates with the FreeBSD skills you’re looking for.&lt;/li&gt;
&lt;li&gt;Face-to-Face Opportunities: Facilitating collaboration among members of the community, and building connections throughout the industry to support a healthy and growing ecosystem and make it easier for you to find resources when questions emerge .&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;We can continue the above work, if we meet our goal this year!&lt;br&gt;
If your company uses FreeBSD, please consider joining our growing list of 2018 partners. If you haven’t made your donation yet, please consider donating today. We are indebted to the individual donors, and companies listed above who have already shown their commitment to open source.&lt;br&gt;
Thank you for supporting FreeBSD and the Foundation!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;September 2018 Release Engineering Update&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The FreeBSD Release Engineering team continued working on the upcoming 12.0 RELEASE.  At present, the 12.0 schedule had been adjusted by one week to allow for necessary works-in-progress to be completed.&lt;br&gt;
Of note, one of the works-in-progress includes updating OpenSSL from 1.0.2 to 1.1.1, in order to avoid breaking the application binary interface (ABI) on an established stable branch.&lt;br&gt;
Due to the level of non-trivial intrusiveness that had already been discovered and addressed in a project branch of the repository, it is possible (but not yet definite) that the schedule will need to be adjusted by another week to allow more time for larger and related updates for this particular update.&lt;br&gt;
Should the 12.0-RELEASE schedule need to be adjusted at any time during the release cycle, the schedule on the FreeBSD project website will be updated accordingly.  The current schedule is available at:&lt;br&gt;
&lt;a href="https://www.freebsd.org/releases/12.0R/schedule.html"&gt;https://www.freebsd.org/releases/12.0R/schedule.html&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;BSDCam 2018 Trip Report: Marie Helene Kvello-Aune&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I’d like to start by thanking the FreeBSD Foundation for sponsoring my trip to BSDCam(bridge) 2018. I wouldn’t have managed to attend otherwise. I’ve used FreeBSD in both personal and professional deployments since the year 2000, and over the last few years I have become more involved with development and documentation.&lt;br&gt;
I arrived in Gatwick, London at midnight. On Monday, August 13,  I took the train to Cambridge, and decided to do some touristy activities as I walked from the train station to Churchill College. I ran into Allan outside the hotel right before the sky decided it was time for a heavy rainfall. Monday was mostly spent settling in, recouping after travel, and hanging out with Allan, Brad, Will and Andy later in the afternoon/evening. Read more…&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Continuous Integration Update&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The FreeBSD Foundation has sponsored the development of the Project’s continuous integration system, available at &lt;a href="https://ci.FreeBSD.org"&gt;https://ci.FreeBSD.org&lt;/a&gt;, since June. Over the summer, we improved both the software and hardware infrastructure, and also added some new jobs for extending test coverage of the -CURRENT and -STABLE branches. Following are some highlights.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;New Hardware&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The Foundation purchased 4 new build machines for scaling up the computation power for the various test jobs. These newer, faster machines substantially speed up the time it takes to test amd64 builds, so that failing changes can be identified more quickly. Also, in August, we received a donation of 2 PINE A64-LTS boards from &lt;a href="http://PINE64.org"&gt;PINE64.org&lt;/a&gt;, which will be put in the hardware test lab as one part of the continuous tests.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;CI Staging Environment&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;We used hardware from a previous generation CI system to build a staging environment for the CI infrastructure, which is available at&lt;br&gt;
&lt;a href="https://ci-dev.freebsd.org"&gt;https://ci-dev.freebsd.org&lt;/a&gt;. It executes the configurations and scripts from the “staging” branch of the FreeBSD-CI repository, and the development feature branches. We also use it to experiment with the new version of the jenkins server and plugins. Having a staging environment avoids affecting the production CI environment, reducing downtime.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Mail Notification&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;In July, we turned on failure notification for all the kernel and world build jobs. Committers will receive email containing the build information and failure log to inform them of possible problems with their modification on certain architectures. For amd64 of the -CURRENT branch, we also enabled the notification on failing regression test cases. Currently mail is sent only to the individual committers, but with help from postmaster team, we have created a dev-ci mailing list and will soon be also sending notifications there.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;New Test Job&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;In August, we updated the embedded script of the virtual machine image. Originally it only executed pre-defined tests, but now this behavior can be modified by the data on the attached disk. This mechanism is used for adding new ZFS tests jobs. We are also working on analyzing and fixing the failing and skipped test cases.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Work in Progress&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;In August and September, we had two developer summits, one in Cambridge, UK and one in Bucharest, Romania. In these meetings, we discussed running special tests, such as ztest,  which need a longer run time. We also planned the network testing for TCP/IP stack&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://chaoticlab.io/c/c++/unix/2018/10/01/daemonize.html"&gt;Daemonize - a Tiny C Library for Programming the UNIX Daemons&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Whatever they say, writing System-V style UNIX daemons is hard. One has to follow many rules to make a daemon process behave correctly on diverse UNIX flavours. Moreover, debugging such a code might be somewhat tricky. On the other hand, the process of daemon initialisation is rigid and well defined so the corresponding code has to be written and debugged once and later can be reused countless number of times.&lt;br&gt;
Developers of BSD UNIX were very aware of this, as there a C library function daemon() was available starting from version 4.4. The function, although non-standard, is present on many UNIXes. Unfortunately, it does not follow all the required steps to reliably run a process in the background on systems which follow System-V semantics (e.g. Linux). The details are available at the corresponding Linux man page. The main problem here, as I understand it, is that daemon() does not use the double-forking technique to avoid the situation when zombie processes appear.&lt;br&gt;
Whenever I encounter a problem like this one, I know it is time to write a tiny C library which solves it. This is exactly how ‘daemonize’ was born (GitHub mirror). The library consists of only two files which are meant to be integrated into the source tree of your project. Recently I have updated the library and realised that it would be good to describe how to use it on this site.&lt;br&gt;
If for some reason you want to make a Windows service, I have a battle tested template code for you as well.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;System-V Daemon Initialisation Procedure&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;To make discussion clear we shall quote the steps which have to be performed during a daemon initialisation (according to daemon(7) manual page on Linux). I do it to demonstrate that this task is more tricky than one might expect.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;So, here we go:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Close all open file descriptors except standard input, output, and error (i.e. the first three file descriptors 0, 1, 2). This ensures that no accidentally passed file descriptor stays around in the daemon process. On Linux, this is best implemented by iterating through /proc/self/fd, with a fallback of iterating from file descriptor 3 to the value returned by getrlimit() for RLIMITNOFILE.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Reset all signal handlers to their default. This is best done by iterating through the available signals up to the limit of _NSIG and resetting them to SIGDFL.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Reset the signal mask using sigprocmask().&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sanitize the environment block, removing or resetting environment variables that might negatively impact daemon runtime.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Call fork(), to create a background process.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the child, call setsid() to detach from any terminal and create an independent session.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the child, call fork() again, to ensure that the daemon can never re-acquire a terminal again.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Call exit() in the first child, so that only the second child (the actual daemon process) stays around. This ensures that the daemon process is re-parented to init/PID 1, as all daemons should be.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the daemon process, connect /dev/null to standard input, output, and error.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the daemon process, reset the umask to 0, so that the file modes passed to open(), mkdir() and suchlike directly control the access mode of the created files and directories.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the daemon process, change the current directory to the root directory (/), in order to avoid that the daemon involuntarily blocks mount points from being unmounted.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the daemon process, write the daemon PID (as returned by getpid()) to a PID file, for example /run/foobar.pid (for a hypothetical daemon “foobar”) to ensure that the daemon cannot be started more than once. This must be implemented in race-free fashion so that the PID file is only updated when it is verified at the same time that the PID previously stored in the PID file no longer exists or belongs to a foreign process.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the daemon process, drop privileges, if possible and applicable.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;From the daemon process, notify the original process started that initialization is complete. This can be implemented via an unnamed pipe or similar communication channel that is created before the first fork() and hence available in both the original and the daemon process.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Call exit() in the original process. The process that invoked the daemon must be able to rely on that this exit() happens after initialization is complete and all external communication channels are established and accessible.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The discussed library does most of the above-mentioned initialisation steps as it becomes immediately evident that implementation details for some of them heavily dependent on the internal logic of an application itself, so it is not possible to implement them in a universal library. I believe it is not a flaw, though, as the missed parts are safe to implement in an application code.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;The Library’s Application Programming Interface&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The generic programming interface was loosely modelled after above-mentioned BSD’s daemon() function. The library provides two user available functions (one is, in fact, implemented on top of the other) as well as a set of flags to control a daemon creation behaviour.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The objective of the library is to hide all the trickery of programming a daemon so you could concentrate on the more creative parts of your application. I hope it does this well.&lt;br&gt;
If you are not only interested in writing a daemon, but also want to make yourself familiar with the techniques which are used to accomplish that, the source code is available. Moreover, I would advise anyone, who starts developing for a UNIX environment to do that, as it shows many intricacies of programming for these platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;br&gt;
&lt;a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018"&gt;EuroBSDCon 2018 travel report and obligatory pics&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This was my first big BSD conference. We also planned - planned might be a big word - thought about doing a devsummit on Friday. Since the people who were in charge of that had a change of plans, I was sure it’d go horribly wrong.&lt;br&gt;
The day before the devsummit and still in the wrong country, I mentioned the hours and venue on the wiki, and booked a reservation for a restaurant.&lt;br&gt;
It turns out that everything was totally fine, and since the devsummit was at the conference venue (that was having tutorials that day), they even had signs pointing at the room we were given. Thanks EuroBSDCon conference organizers!&lt;br&gt;
At the devsummit, we spent some time hacking. A few people came with “travel laptops” without access to anything, like Riastradh, so I gave him access to my own laptop. This didn’t hold very long and I kinda forgot about it, but for a few moments he had access to a NetBSD source tree and an 8 thread, 16GB RAM machine with which to build things.&lt;br&gt;
We had a short introduction and I suggested we take some pictures, so here’s the ones we got. A few people were concerned about privacy, so they’re not pictured. We had small team to hold the camera :-)&lt;br&gt;
At the actual conference days, I stayed at the speaker hotel with the other speakers. I’ve attempted to make conversation with some visibly FreeBSD/OpenBSD people, but didn’t have plans to talk about anything, so there was a lot of just following people silently.&lt;br&gt;
Perhaps for the next conference I’ll prepare a list of questions to random BSD people and then very obviously grab a piece of paper and ask, “what was…”, read a bit from it, and say, “your latest kernel panic?”, I’m sure it’ll be a great conversation starter.&lt;br&gt;
At the conference itself, was pretty cool to have folks like Kirk McKusick give first person accounts of some past events (Kirk gave a talk about governance at FreeBSD), or the second keynote by Ron Broersma.&lt;br&gt;
My own talk was hastily prepared, it was difficult to bring the topic together into a coherent talk. Nevertheless, I managed to talk about stuff for a while 40 minutes, though usually I skip over so many details that I have trouble putting together a sufficiently long talk.&lt;br&gt;
I mentioned some of my coolest bugs to solve (I should probably make a separate article about some!). A few people asked for the slides after the talk, so I guess it wasn’t totally incoherent.&lt;br&gt;
It was really fun to meet some of my favourite NetBSD people. I got to show off my now fairly well working laptop (it took a lot of work by all of us!).&lt;br&gt;
After the conference I came back with a conference cold, and it took a few days to recover from it. Hopefully I didn’t infect too many people on the way back.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://panoramacircle.com/2018/09/23/ghostbsd-tested-on-real-hardware-t410-better-than-trueos/"&gt;GhostBSD tested on real hardware T410 – better than TrueOS?&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;You might have heard about FreeBSD which is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install and some apps as well!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Nowadays if you want some of that BSD on your personal desktop how to go about? Well there is a full package or distro called GhostBSD which is based on FreeBSD current with a Mate or XFCE desktop preconfigured. I did try another package called TrueOS before and you can check out my blog post as well.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Let’s give it a try on my Lenovo ThinkPad T410. You can download the latest version from &lt;a href="http://ghostbsd.org"&gt;ghostbsd.org&lt;/a&gt;. Creating a bootable USB drive was surprisingly difficult as rufus did not work and created a corrupted drive. You have to follow this procedure under Windows: download the 2.5GB .iso file and rename the extension to .img. Download Win32 Disk imager and burn the img file to an USB drive and boot from it. You will be able to start a live session and use the onboard setup to install GhostBSD unto a disk.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;I did encounter some bugs or quirks along the way. The installer failed the first time for some unknown reason but worked on the second attempt. The first boot stopped upon initialization of the USB3 ports (the T410 does not have USB3) but I could use some ‘exit’ command line magic to continue. The second boot worked fine. Audio was only available through headphones, not speakers but that could partially be fixed using the command line again. Lot’s of installed apps did not show up in the start menu and on goes the quirks list.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Overall it is still better than TrueOS for me because drivers did work very well and I could address most of the existing bugs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;On the upside:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Free and open source FreeBSD package ready to go&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Mate or XFCE desktop (Mate is the only option for daily builds)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Drivers work fine including LAN, WiFi, video 2D &amp;amp; 3D, audio, etc&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;UFS or ZFS advanced file systems available&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Some downsides:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Less driver and direct app support than Linux&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Installer and desktop have some quirks and bugs&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;App-store is cumbersome, inferior to TrueOS&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018_and_netbsd_sanitizers"&gt;EuroBSDCon 2018 and NetBSD sanitizers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20181002175838"&gt;New mandoc feature: -T html -O toc&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.geeklan.co.uk/?p=2307"&gt;EuroBSDcon 2018&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oshogbo.vexillium.org/blog/55/"&gt;Polish BSD User Group&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://garbage.fm/episodes/43"&gt;garbage[43]: What year is it?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thedemoat50.org/"&gt;The Demo @ 50&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://youtu.be/tG8R5SQGPck?t=660"&gt;Microsoft ports DTrace from FreeBSD to Windows 10&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/openbsd"&gt;OpenBSD joins Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://roy.marples.name/blog/netbsd-curses-ripoffline-improvements"&gt;NetBSD curses ripoffline improvements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2018-October/089717.html"&gt;FCP-0101: Deprecating most 10/100 Ethernet drivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/tech-pkg/2018/10/05/msg020326.html"&gt;Announcing the pkgsrc-2018Q3 release&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.netzbasis.de/openbsd/vmd-debian/index.html"&gt;Debian on OpenBSD vmd (without qemu or another debian system)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jcs/login_duress"&gt;A BSD authentication module for duress passwords (Joshua Stein)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/oshogbovx/status/1019334534935007232?s=03"&gt;Disk Price/Performance Analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;DJ - &lt;a href="http://dpaste.com/0YV8WC6#wrap"&gt;Zombie ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Josua - &lt;a href="http://dpaste.com/25B1EA8"&gt;arm tier 1? how to approach it&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;-Gamah - &lt;a href="http://dpaste.com/2SMSGPB"&gt;5ghz&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, ghostbsd, eurobsdcon, daemon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Foundation September Update, tiny C lib for programming Unix daemons, EuroBSDcon trip reports, GhostBSD tested on real hardware, and a BSD auth module for duress.</p>

<p>##Headlines<br>
###<a href="https://www.freebsdfoundation.org/news-and-events/newsletter/freebsd-foundation-update-september-2018/">FreeBSD Foundation Update, September 2018</a></p>

<ul>
<li>MESSAGE FROM THE EXECUTIVE DIRECTOR</li>
</ul>

<blockquote>
<p>Dear FreeBSD Community Member, It is hard to believe that September is over. The Foundation team had a busy month promoting FreeBSD all over the globe, bug fixing in preparation for 12.0, and setting plans in motion to kick off our 4th quarter fundraising and advocacy efforts. Take a minute to see what we’ve been up to and please consider making a donation to help us continue our efforts supporting FreeBSD!</p>
</blockquote>

<ul>
<li>September 2018 Development Projects Update</li>
</ul>

<blockquote>
<p>In preparation for the release of FreeBSD 12.0, I have been working on investigating and fixing a backlog of kernel bug reports.  Of course, this kind of work is never finished, and we will continue to make progress after the release.  In the past couple of months I have fixed a combination of long-standing issues and recent regressions.  Of note are a pair of UNIX domain socket bugs which had been affecting various applications for years.  In particular, Chromium tabs would frequently hang unless a workaround was manually applied to the system, and the bug had started affecting recent versions of Firefox as well.  Fixing these issues gave me an opportunity to revisit and extend our regression testing for UNIX sockets, which, in turn, resulted in some related bugs being identified and fixed.<br>
Of late I have also been investigating reports of issues with ZFS, particularly, those reported on FreeBSD 11.2.  A number of regressions, including a kernel memory leak and issues with ARC reclamation, have already been fixed for 12.0; investigation of other reports is ongoing. Those who closely follow FreeBSD-CURRENT know that some exciting work to improve memory usage on NUMA systems is now enabled by default.  As is usually the case when new code is deployed in a diverse array of systems and workloads, a number of problems since have been identified. We are working on resolving them as soon as possible to ensure the quality of the release.<br>
I’m passionate about maintaining FreeBSD’s stability and dependability as it continues to expand and grow new features, and I’m grateful to the FreeBSD Foundation for sponsoring this work.  We depend on users to report problems to the mailing lists and via the bug tracker, so please try running the 12.0 candidate builds and help us make 12.0 a great release.</p>
</blockquote>

<ul>
<li>Fundraising Update: Supporting the Project</li>
</ul>

<blockquote>
<p>It’s officially Fall here at Foundation headquarters and we’re heading full-steam into our final fundraising campaign of the year. We couldn’t even have begun to reach our funding goal of $1.25 million dollars without the support from the companies who have partnered with us this year. Thank you to Verisign for becoming a Silver Partner. They now join a growing list of companies like Xiplink, NetApp, Microsoft, Tarsnap, VMware, and NeoSmart Technologies that are stepping up and showing their commitment to FreeBSD!<br>
Funding from commercial users like these and individual users like yourself, help us continue our efforts of supporting critical areas of FreeBSD such as:</p>
</blockquote>

<ul>
<li>Operating System Improvements: Providing staff to immediately respond to urgent problems and implement new features and functionality allowing for the innovation and stability you’ve come to rely on.</li>
<li>Security: Providing engineering resources to bolster the capacity and responsiveness of the Security team providing your users with piece of mind when security issues arise.</li>
<li>Release Engineering: Continue providing a full-time release engineer, resulting in timely and reliable releases you can plan around.</li>
<li>Quality Assurance: Improving and increasing test coverage, continuous integration, and automated testing with a full-time software engineer to ensure you receive the highest quality, secure, and reliable operating system.</li>
<li>New User Experience: Improving the process and documentation for getting new people involved with FreeBSD, and supporting those people as they become integrated into the FreeBSD Community providing the resources you may need to get new folks up to speed.</li>
<li>Training: Supporting more FreeBSD training for undergraduates, graduates, and postgraduates. Growing the community means reaching people and catching their interest in systems software as early as possible and providing you with a bigger pool of candidates with the FreeBSD skills you’re looking for.</li>
<li>Face-to-Face Opportunities: Facilitating collaboration among members of the community, and building connections throughout the industry to support a healthy and growing ecosystem and make it easier for you to find resources when questions emerge .</li>
</ul>

<blockquote>
<p>We can continue the above work, if we meet our goal this year!<br>
If your company uses FreeBSD, please consider joining our growing list of 2018 partners. If you haven’t made your donation yet, please consider donating today. We are indebted to the individual donors, and companies listed above who have already shown their commitment to open source.<br>
Thank you for supporting FreeBSD and the Foundation!</p>
</blockquote>

<ul>
<li>September 2018 Release Engineering Update</li>
</ul>

<blockquote>
<p>The FreeBSD Release Engineering team continued working on the upcoming 12.0 RELEASE.  At present, the 12.0 schedule had been adjusted by one week to allow for necessary works-in-progress to be completed.<br>
Of note, one of the works-in-progress includes updating OpenSSL from 1.0.2 to 1.1.1, in order to avoid breaking the application binary interface (ABI) on an established stable branch.<br>
Due to the level of non-trivial intrusiveness that had already been discovered and addressed in a project branch of the repository, it is possible (but not yet definite) that the schedule will need to be adjusted by another week to allow more time for larger and related updates for this particular update.<br>
Should the 12.0-RELEASE schedule need to be adjusted at any time during the release cycle, the schedule on the FreeBSD project website will be updated accordingly.  The current schedule is available at:<br>
<a href="https://www.freebsd.org/releases/12.0R/schedule.html">https://www.freebsd.org/releases/12.0R/schedule.html</a></p>
</blockquote>

<ul>
<li>BSDCam 2018 Trip Report: Marie Helene Kvello-Aune</li>
</ul>

<blockquote>
<p>I’d like to start by thanking the FreeBSD Foundation for sponsoring my trip to BSDCam(bridge) 2018. I wouldn’t have managed to attend otherwise. I’ve used FreeBSD in both personal and professional deployments since the year 2000, and over the last few years I have become more involved with development and documentation.<br>
I arrived in Gatwick, London at midnight. On Monday, August 13,  I took the train to Cambridge, and decided to do some touristy activities as I walked from the train station to Churchill College. I ran into Allan outside the hotel right before the sky decided it was time for a heavy rainfall. Monday was mostly spent settling in, recouping after travel, and hanging out with Allan, Brad, Will and Andy later in the afternoon/evening. Read more…</p>
</blockquote>

<ul>
<li>Continuous Integration Update</li>
</ul>

<blockquote>
<p>The FreeBSD Foundation has sponsored the development of the Project’s continuous integration system, available at <a href="https://ci.FreeBSD.org">https://ci.FreeBSD.org</a>, since June. Over the summer, we improved both the software and hardware infrastructure, and also added some new jobs for extending test coverage of the -CURRENT and -STABLE branches. Following are some highlights.</p>
</blockquote>

<ul>
<li>New Hardware</li>
</ul>

<blockquote>
<p>The Foundation purchased 4 new build machines for scaling up the computation power for the various test jobs. These newer, faster machines substantially speed up the time it takes to test amd64 builds, so that failing changes can be identified more quickly. Also, in August, we received a donation of 2 PINE A64-LTS boards from <a href="http://PINE64.org">PINE64.org</a>, which will be put in the hardware test lab as one part of the continuous tests.</p>
</blockquote>

<ul>
<li>CI Staging Environment</li>
</ul>

<blockquote>
<p>We used hardware from a previous generation CI system to build a staging environment for the CI infrastructure, which is available at<br>
<a href="https://ci-dev.freebsd.org">https://ci-dev.freebsd.org</a>. It executes the configurations and scripts from the “staging” branch of the FreeBSD-CI repository, and the development feature branches. We also use it to experiment with the new version of the jenkins server and plugins. Having a staging environment avoids affecting the production CI environment, reducing downtime.</p>
</blockquote>

<ul>
<li>Mail Notification</li>
</ul>

<blockquote>
<p>In July, we turned on failure notification for all the kernel and world build jobs. Committers will receive email containing the build information and failure log to inform them of possible problems with their modification on certain architectures. For amd64 of the -CURRENT branch, we also enabled the notification on failing regression test cases. Currently mail is sent only to the individual committers, but with help from postmaster team, we have created a dev-ci mailing list and will soon be also sending notifications there.</p>
</blockquote>

<ul>
<li>New Test Job</li>
</ul>

<blockquote>
<p>In August, we updated the embedded script of the virtual machine image. Originally it only executed pre-defined tests, but now this behavior can be modified by the data on the attached disk. This mechanism is used for adding new ZFS tests jobs. We are also working on analyzing and fixing the failing and skipped test cases.</p>
</blockquote>

<ul>
<li>Work in Progress</li>
</ul>

<blockquote>
<p>In August and September, we had two developer summits, one in Cambridge, UK and one in Bucharest, Romania. In these meetings, we discussed running special tests, such as ztest,  which need a longer run time. We also planned the network testing for TCP/IP stack</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chaoticlab.io/c/c++/unix/2018/10/01/daemonize.html">Daemonize - a Tiny C Library for Programming the UNIX Daemons</a></p>

<blockquote>
<p>Whatever they say, writing System-V style UNIX daemons is hard. One has to follow many rules to make a daemon process behave correctly on diverse UNIX flavours. Moreover, debugging such a code might be somewhat tricky. On the other hand, the process of daemon initialisation is rigid and well defined so the corresponding code has to be written and debugged once and later can be reused countless number of times.<br>
Developers of BSD UNIX were very aware of this, as there a C library function daemon() was available starting from version 4.4. The function, although non-standard, is present on many UNIXes. Unfortunately, it does not follow all the required steps to reliably run a process in the background on systems which follow System-V semantics (e.g. Linux). The details are available at the corresponding Linux man page. The main problem here, as I understand it, is that daemon() does not use the double-forking technique to avoid the situation when zombie processes appear.<br>
Whenever I encounter a problem like this one, I know it is time to write a tiny C library which solves it. This is exactly how ‘daemonize’ was born (GitHub mirror). The library consists of only two files which are meant to be integrated into the source tree of your project. Recently I have updated the library and realised that it would be good to describe how to use it on this site.<br>
If for some reason you want to make a Windows service, I have a battle tested template code for you as well.</p>
</blockquote>

<ul>
<li>System-V Daemon Initialisation Procedure</li>
</ul>

<blockquote>
<p>To make discussion clear we shall quote the steps which have to be performed during a daemon initialisation (according to daemon(7) manual page on Linux). I do it to demonstrate that this task is more tricky than one might expect.</p>
</blockquote>

<ul>
<li>
<p>So, here we go:</p>
</li>
<li>
<p>Close all open file descriptors except standard input, output, and error (i.e. the first three file descriptors 0, 1, 2). This ensures that no accidentally passed file descriptor stays around in the daemon process. On Linux, this is best implemented by iterating through /proc/self/fd, with a fallback of iterating from file descriptor 3 to the value returned by getrlimit() for RLIMIT_NOFILE.</p>
</li>
<li>
<p>Reset all signal handlers to their default. This is best done by iterating through the available signals up to the limit of _NSIG and resetting them to SIG_DFL.</p>
</li>
<li>
<p>Reset the signal mask using sigprocmask().</p>
</li>
<li>
<p>Sanitize the environment block, removing or resetting environment variables that might negatively impact daemon runtime.</p>
</li>
<li>
<p>Call fork(), to create a background process.</p>
</li>
<li>
<p>In the child, call setsid() to detach from any terminal and create an independent session.</p>
</li>
<li>
<p>In the child, call fork() again, to ensure that the daemon can never re-acquire a terminal again.</p>
</li>
<li>
<p>Call exit() in the first child, so that only the second child (the actual daemon process) stays around. This ensures that the daemon process is re-parented to init/PID 1, as all daemons should be.</p>
</li>
<li>
<p>In the daemon process, connect /dev/null to standard input, output, and error.</p>
</li>
<li>
<p>In the daemon process, reset the umask to 0, so that the file modes passed to open(), mkdir() and suchlike directly control the access mode of the created files and directories.</p>
</li>
<li>
<p>In the daemon process, change the current directory to the root directory (/), in order to avoid that the daemon involuntarily blocks mount points from being unmounted.</p>
</li>
<li>
<p>In the daemon process, write the daemon PID (as returned by getpid()) to a PID file, for example /run/foobar.pid (for a hypothetical daemon “foobar”) to ensure that the daemon cannot be started more than once. This must be implemented in race-free fashion so that the PID file is only updated when it is verified at the same time that the PID previously stored in the PID file no longer exists or belongs to a foreign process.</p>
</li>
<li>
<p>In the daemon process, drop privileges, if possible and applicable.</p>
</li>
<li>
<p>From the daemon process, notify the original process started that initialization is complete. This can be implemented via an unnamed pipe or similar communication channel that is created before the first fork() and hence available in both the original and the daemon process.</p>
</li>
<li>
<p>Call exit() in the original process. The process that invoked the daemon must be able to rely on that this exit() happens after initialization is complete and all external communication channels are established and accessible.</p>
</li>
</ul>

<blockquote>
<p>The discussed library does most of the above-mentioned initialisation steps as it becomes immediately evident that implementation details for some of them heavily dependent on the internal logic of an application itself, so it is not possible to implement them in a universal library. I believe it is not a flaw, though, as the missed parts are safe to implement in an application code.</p>
</blockquote>

<ul>
<li>The Library’s Application Programming Interface</li>
</ul>

<blockquote>
<p>The generic programming interface was loosely modelled after above-mentioned BSD’s daemon() function. The library provides two user available functions (one is, in fact, implemented on top of the other) as well as a set of flags to control a daemon creation behaviour.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>The objective of the library is to hide all the trickery of programming a daemon so you could concentrate on the more creative parts of your application. I hope it does this well.<br>
If you are not only interested in writing a daemon, but also want to make yourself familiar with the techniques which are used to accomplish that, the source code is available. Moreover, I would advise anyone, who starts developing for a UNIX environment to do that, as it shows many intricacies of programming for these platforms.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018">EuroBSDCon 2018 travel report and obligatory pics</a></p>

<blockquote>
<p>This was my first big BSD conference. We also planned - planned might be a big word - thought about doing a devsummit on Friday. Since the people who were in charge of that had a change of plans, I was sure it’d go horribly wrong.<br>
The day before the devsummit and still in the wrong country, I mentioned the hours and venue on the wiki, and booked a reservation for a restaurant.<br>
It turns out that everything was totally fine, and since the devsummit was at the conference venue (that was having tutorials that day), they even had signs pointing at the room we were given. Thanks EuroBSDCon conference organizers!<br>
At the devsummit, we spent some time hacking. A few people came with “travel laptops” without access to anything, like Riastradh, so I gave him access to my own laptop. This didn’t hold very long and I kinda forgot about it, but for a few moments he had access to a NetBSD source tree and an 8 thread, 16GB RAM machine with which to build things.<br>
We had a short introduction and I suggested we take some pictures, so here’s the ones we got. A few people were concerned about privacy, so they’re not pictured. We had small team to hold the camera :-)<br>
At the actual conference days, I stayed at the speaker hotel with the other speakers. I’ve attempted to make conversation with some visibly FreeBSD/OpenBSD people, but didn’t have plans to talk about anything, so there was a lot of just following people silently.<br>
Perhaps for the next conference I’ll prepare a list of questions to random BSD people and then very obviously grab a piece of paper and ask, “what was…”, read a bit from it, and say, “your latest kernel panic?”, I’m sure it’ll be a great conversation starter.<br>
At the conference itself, was pretty cool to have folks like Kirk McKusick give first person accounts of some past events (Kirk gave a talk about governance at FreeBSD), or the second keynote by Ron Broersma.<br>
My own talk was hastily prepared, it was difficult to bring the topic together into a coherent talk. Nevertheless, I managed to talk about stuff for a while 40 minutes, though usually I skip over so many details that I have trouble putting together a sufficiently long talk.<br>
I mentioned some of my coolest bugs to solve (I should probably make a separate article about some!). A few people asked for the slides after the talk, so I guess it wasn’t totally incoherent.<br>
It was really fun to meet some of my favourite NetBSD people. I got to show off my now fairly well working laptop (it took a lot of work by all of us!).<br>
After the conference I came back with a conference cold, and it took a few days to recover from it. Hopefully I didn’t infect too many people on the way back.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/09/23/ghostbsd-tested-on-real-hardware-t410-better-than-trueos/">GhostBSD tested on real hardware T410 – better than TrueOS?</a></p>

<blockquote>
<p>You might have heard about FreeBSD which is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install and some apps as well!</p>
</blockquote>

<blockquote>
<p>Nowadays if you want some of that BSD on your personal desktop how to go about? Well there is a full package or distro called GhostBSD which is based on FreeBSD current with a Mate or XFCE desktop preconfigured. I did try another package called TrueOS before and you can check out my blog post as well.</p>
</blockquote>

<blockquote>
<p>Let’s give it a try on my Lenovo ThinkPad T410. You can download the latest version from <a href="http://ghostbsd.org">ghostbsd.org</a>. Creating a bootable USB drive was surprisingly difficult as rufus did not work and created a corrupted drive. You have to follow this procedure under Windows: download the 2.5GB .iso file and rename the extension to .img. Download Win32 Disk imager and burn the img file to an USB drive and boot from it. You will be able to start a live session and use the onboard setup to install GhostBSD unto a disk.</p>
</blockquote>

<blockquote>
<p>I did encounter some bugs or quirks along the way. The installer failed the first time for some unknown reason but worked on the second attempt. The first boot stopped upon initialization of the USB3 ports (the T410 does not have USB3) but I could use some ‘exit’ command line magic to continue. The second boot worked fine. Audio was only available through headphones, not speakers but that could partially be fixed using the command line again. Lot’s of installed apps did not show up in the start menu and on goes the quirks list.</p>
</blockquote>

<blockquote>
<p>Overall it is still better than TrueOS for me because drivers did work very well and I could address most of the existing bugs.</p>
</blockquote>

<ul>
<li>
<p>On the upside:</p>
</li>
<li>
<p>Free and open source FreeBSD package ready to go</p>
</li>
<li>
<p>Mate or XFCE desktop (Mate is the only option for daily builds)</p>
</li>
<li>
<p>Drivers work fine including LAN, WiFi, video 2D &amp; 3D, audio, etc</p>
</li>
<li>
<p>UFS or ZFS advanced file systems available</p>
</li>
<li>
<p>Some downsides:</p>
</li>
<li>
<p>Less driver and direct app support than Linux</p>
</li>
<li>
<p>Installer and desktop have some quirks and bugs</p>
</li>
<li>
<p>App-store is cumbersome, inferior to TrueOS</p>
</li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018_and_netbsd_sanitizers">EuroBSDCon 2018 and NetBSD sanitizers</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181002175838">New mandoc feature: -T html -O toc</a></li>
<li><a href="https://www.geeklan.co.uk/?p=2307">EuroBSDcon 2018</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/55/">Polish BSD User Group</a></li>
<li><a href="https://garbage.fm/episodes/43">garbage[43]: What year is it?</a></li>
<li><a href="https://thedemoat50.org/">The Demo @ 50</a></li>
<li><a href="https://youtu.be/tG8R5SQGPck?t=660">Microsoft ports DTrace from FreeBSD to Windows 10</a></li>
<li><a href="https://twitter.com/openbsd">OpenBSD joins Twitter</a></li>
<li><a href="https://roy.marples.name/blog/netbsd-curses-ripoffline-improvements">NetBSD curses ripoffline improvements</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2018-October/089717.html">FCP-0101: Deprecating most 10/100 Ethernet drivers</a></li>
<li><a href="https://mail-index.netbsd.org/tech-pkg/2018/10/05/msg020326.html">Announcing the pkgsrc-2018Q3 release</a></li>
<li><a href="http://www.netzbasis.de/openbsd/vmd-debian/index.html">Debian on OpenBSD vmd (without qemu or another debian system)</a></li>
<li><a href="https://github.com/jcs/login_duress">A BSD authentication module for duress passwords (Joshua Stein)</a></li>
<li><a href="https://twitter.com/oshogbovx/status/1019334534935007232?s=03">Disk Price/Performance Analysis</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>DJ - <a href="http://dpaste.com/0YV8WC6#wrap">Zombie ZFS</a></li>
<li>Josua - <a href="http://dpaste.com/25B1EA8">arm tier 1? how to approach it</a></li>
<li>-Gamah - <a href="http://dpaste.com/2SMSGPB">5ghz</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Foundation September Update, tiny C lib for programming Unix daemons, EuroBSDcon trip reports, GhostBSD tested on real hardware, and a BSD auth module for duress.</p>

<p>##Headlines<br>
###<a href="https://www.freebsdfoundation.org/news-and-events/newsletter/freebsd-foundation-update-september-2018/">FreeBSD Foundation Update, September 2018</a></p>

<ul>
<li>MESSAGE FROM THE EXECUTIVE DIRECTOR</li>
</ul>

<blockquote>
<p>Dear FreeBSD Community Member, It is hard to believe that September is over. The Foundation team had a busy month promoting FreeBSD all over the globe, bug fixing in preparation for 12.0, and setting plans in motion to kick off our 4th quarter fundraising and advocacy efforts. Take a minute to see what we’ve been up to and please consider making a donation to help us continue our efforts supporting FreeBSD!</p>
</blockquote>

<ul>
<li>September 2018 Development Projects Update</li>
</ul>

<blockquote>
<p>In preparation for the release of FreeBSD 12.0, I have been working on investigating and fixing a backlog of kernel bug reports.  Of course, this kind of work is never finished, and we will continue to make progress after the release.  In the past couple of months I have fixed a combination of long-standing issues and recent regressions.  Of note are a pair of UNIX domain socket bugs which had been affecting various applications for years.  In particular, Chromium tabs would frequently hang unless a workaround was manually applied to the system, and the bug had started affecting recent versions of Firefox as well.  Fixing these issues gave me an opportunity to revisit and extend our regression testing for UNIX sockets, which, in turn, resulted in some related bugs being identified and fixed.<br>
Of late I have also been investigating reports of issues with ZFS, particularly, those reported on FreeBSD 11.2.  A number of regressions, including a kernel memory leak and issues with ARC reclamation, have already been fixed for 12.0; investigation of other reports is ongoing. Those who closely follow FreeBSD-CURRENT know that some exciting work to improve memory usage on NUMA systems is now enabled by default.  As is usually the case when new code is deployed in a diverse array of systems and workloads, a number of problems since have been identified. We are working on resolving them as soon as possible to ensure the quality of the release.<br>
I’m passionate about maintaining FreeBSD’s stability and dependability as it continues to expand and grow new features, and I’m grateful to the FreeBSD Foundation for sponsoring this work.  We depend on users to report problems to the mailing lists and via the bug tracker, so please try running the 12.0 candidate builds and help us make 12.0 a great release.</p>
</blockquote>

<ul>
<li>Fundraising Update: Supporting the Project</li>
</ul>

<blockquote>
<p>It’s officially Fall here at Foundation headquarters and we’re heading full-steam into our final fundraising campaign of the year. We couldn’t even have begun to reach our funding goal of $1.25 million dollars without the support from the companies who have partnered with us this year. Thank you to Verisign for becoming a Silver Partner. They now join a growing list of companies like Xiplink, NetApp, Microsoft, Tarsnap, VMware, and NeoSmart Technologies that are stepping up and showing their commitment to FreeBSD!<br>
Funding from commercial users like these and individual users like yourself, help us continue our efforts of supporting critical areas of FreeBSD such as:</p>
</blockquote>

<ul>
<li>Operating System Improvements: Providing staff to immediately respond to urgent problems and implement new features and functionality allowing for the innovation and stability you’ve come to rely on.</li>
<li>Security: Providing engineering resources to bolster the capacity and responsiveness of the Security team providing your users with piece of mind when security issues arise.</li>
<li>Release Engineering: Continue providing a full-time release engineer, resulting in timely and reliable releases you can plan around.</li>
<li>Quality Assurance: Improving and increasing test coverage, continuous integration, and automated testing with a full-time software engineer to ensure you receive the highest quality, secure, and reliable operating system.</li>
<li>New User Experience: Improving the process and documentation for getting new people involved with FreeBSD, and supporting those people as they become integrated into the FreeBSD Community providing the resources you may need to get new folks up to speed.</li>
<li>Training: Supporting more FreeBSD training for undergraduates, graduates, and postgraduates. Growing the community means reaching people and catching their interest in systems software as early as possible and providing you with a bigger pool of candidates with the FreeBSD skills you’re looking for.</li>
<li>Face-to-Face Opportunities: Facilitating collaboration among members of the community, and building connections throughout the industry to support a healthy and growing ecosystem and make it easier for you to find resources when questions emerge .</li>
</ul>

<blockquote>
<p>We can continue the above work, if we meet our goal this year!<br>
If your company uses FreeBSD, please consider joining our growing list of 2018 partners. If you haven’t made your donation yet, please consider donating today. We are indebted to the individual donors, and companies listed above who have already shown their commitment to open source.<br>
Thank you for supporting FreeBSD and the Foundation!</p>
</blockquote>

<ul>
<li>September 2018 Release Engineering Update</li>
</ul>

<blockquote>
<p>The FreeBSD Release Engineering team continued working on the upcoming 12.0 RELEASE.  At present, the 12.0 schedule had been adjusted by one week to allow for necessary works-in-progress to be completed.<br>
Of note, one of the works-in-progress includes updating OpenSSL from 1.0.2 to 1.1.1, in order to avoid breaking the application binary interface (ABI) on an established stable branch.<br>
Due to the level of non-trivial intrusiveness that had already been discovered and addressed in a project branch of the repository, it is possible (but not yet definite) that the schedule will need to be adjusted by another week to allow more time for larger and related updates for this particular update.<br>
Should the 12.0-RELEASE schedule need to be adjusted at any time during the release cycle, the schedule on the FreeBSD project website will be updated accordingly.  The current schedule is available at:<br>
<a href="https://www.freebsd.org/releases/12.0R/schedule.html">https://www.freebsd.org/releases/12.0R/schedule.html</a></p>
</blockquote>

<ul>
<li>BSDCam 2018 Trip Report: Marie Helene Kvello-Aune</li>
</ul>

<blockquote>
<p>I’d like to start by thanking the FreeBSD Foundation for sponsoring my trip to BSDCam(bridge) 2018. I wouldn’t have managed to attend otherwise. I’ve used FreeBSD in both personal and professional deployments since the year 2000, and over the last few years I have become more involved with development and documentation.<br>
I arrived in Gatwick, London at midnight. On Monday, August 13,  I took the train to Cambridge, and decided to do some touristy activities as I walked from the train station to Churchill College. I ran into Allan outside the hotel right before the sky decided it was time for a heavy rainfall. Monday was mostly spent settling in, recouping after travel, and hanging out with Allan, Brad, Will and Andy later in the afternoon/evening. Read more…</p>
</blockquote>

<ul>
<li>Continuous Integration Update</li>
</ul>

<blockquote>
<p>The FreeBSD Foundation has sponsored the development of the Project’s continuous integration system, available at <a href="https://ci.FreeBSD.org">https://ci.FreeBSD.org</a>, since June. Over the summer, we improved both the software and hardware infrastructure, and also added some new jobs for extending test coverage of the -CURRENT and -STABLE branches. Following are some highlights.</p>
</blockquote>

<ul>
<li>New Hardware</li>
</ul>

<blockquote>
<p>The Foundation purchased 4 new build machines for scaling up the computation power for the various test jobs. These newer, faster machines substantially speed up the time it takes to test amd64 builds, so that failing changes can be identified more quickly. Also, in August, we received a donation of 2 PINE A64-LTS boards from <a href="http://PINE64.org">PINE64.org</a>, which will be put in the hardware test lab as one part of the continuous tests.</p>
</blockquote>

<ul>
<li>CI Staging Environment</li>
</ul>

<blockquote>
<p>We used hardware from a previous generation CI system to build a staging environment for the CI infrastructure, which is available at<br>
<a href="https://ci-dev.freebsd.org">https://ci-dev.freebsd.org</a>. It executes the configurations and scripts from the “staging” branch of the FreeBSD-CI repository, and the development feature branches. We also use it to experiment with the new version of the jenkins server and plugins. Having a staging environment avoids affecting the production CI environment, reducing downtime.</p>
</blockquote>

<ul>
<li>Mail Notification</li>
</ul>

<blockquote>
<p>In July, we turned on failure notification for all the kernel and world build jobs. Committers will receive email containing the build information and failure log to inform them of possible problems with their modification on certain architectures. For amd64 of the -CURRENT branch, we also enabled the notification on failing regression test cases. Currently mail is sent only to the individual committers, but with help from postmaster team, we have created a dev-ci mailing list and will soon be also sending notifications there.</p>
</blockquote>

<ul>
<li>New Test Job</li>
</ul>

<blockquote>
<p>In August, we updated the embedded script of the virtual machine image. Originally it only executed pre-defined tests, but now this behavior can be modified by the data on the attached disk. This mechanism is used for adding new ZFS tests jobs. We are also working on analyzing and fixing the failing and skipped test cases.</p>
</blockquote>

<ul>
<li>Work in Progress</li>
</ul>

<blockquote>
<p>In August and September, we had two developer summits, one in Cambridge, UK and one in Bucharest, Romania. In these meetings, we discussed running special tests, such as ztest,  which need a longer run time. We also planned the network testing for TCP/IP stack</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chaoticlab.io/c/c++/unix/2018/10/01/daemonize.html">Daemonize - a Tiny C Library for Programming the UNIX Daemons</a></p>

<blockquote>
<p>Whatever they say, writing System-V style UNIX daemons is hard. One has to follow many rules to make a daemon process behave correctly on diverse UNIX flavours. Moreover, debugging such a code might be somewhat tricky. On the other hand, the process of daemon initialisation is rigid and well defined so the corresponding code has to be written and debugged once and later can be reused countless number of times.<br>
Developers of BSD UNIX were very aware of this, as there a C library function daemon() was available starting from version 4.4. The function, although non-standard, is present on many UNIXes. Unfortunately, it does not follow all the required steps to reliably run a process in the background on systems which follow System-V semantics (e.g. Linux). The details are available at the corresponding Linux man page. The main problem here, as I understand it, is that daemon() does not use the double-forking technique to avoid the situation when zombie processes appear.<br>
Whenever I encounter a problem like this one, I know it is time to write a tiny C library which solves it. This is exactly how ‘daemonize’ was born (GitHub mirror). The library consists of only two files which are meant to be integrated into the source tree of your project. Recently I have updated the library and realised that it would be good to describe how to use it on this site.<br>
If for some reason you want to make a Windows service, I have a battle tested template code for you as well.</p>
</blockquote>

<ul>
<li>System-V Daemon Initialisation Procedure</li>
</ul>

<blockquote>
<p>To make discussion clear we shall quote the steps which have to be performed during a daemon initialisation (according to daemon(7) manual page on Linux). I do it to demonstrate that this task is more tricky than one might expect.</p>
</blockquote>

<ul>
<li>
<p>So, here we go:</p>
</li>
<li>
<p>Close all open file descriptors except standard input, output, and error (i.e. the first three file descriptors 0, 1, 2). This ensures that no accidentally passed file descriptor stays around in the daemon process. On Linux, this is best implemented by iterating through /proc/self/fd, with a fallback of iterating from file descriptor 3 to the value returned by getrlimit() for RLIMIT_NOFILE.</p>
</li>
<li>
<p>Reset all signal handlers to their default. This is best done by iterating through the available signals up to the limit of _NSIG and resetting them to SIG_DFL.</p>
</li>
<li>
<p>Reset the signal mask using sigprocmask().</p>
</li>
<li>
<p>Sanitize the environment block, removing or resetting environment variables that might negatively impact daemon runtime.</p>
</li>
<li>
<p>Call fork(), to create a background process.</p>
</li>
<li>
<p>In the child, call setsid() to detach from any terminal and create an independent session.</p>
</li>
<li>
<p>In the child, call fork() again, to ensure that the daemon can never re-acquire a terminal again.</p>
</li>
<li>
<p>Call exit() in the first child, so that only the second child (the actual daemon process) stays around. This ensures that the daemon process is re-parented to init/PID 1, as all daemons should be.</p>
</li>
<li>
<p>In the daemon process, connect /dev/null to standard input, output, and error.</p>
</li>
<li>
<p>In the daemon process, reset the umask to 0, so that the file modes passed to open(), mkdir() and suchlike directly control the access mode of the created files and directories.</p>
</li>
<li>
<p>In the daemon process, change the current directory to the root directory (/), in order to avoid that the daemon involuntarily blocks mount points from being unmounted.</p>
</li>
<li>
<p>In the daemon process, write the daemon PID (as returned by getpid()) to a PID file, for example /run/foobar.pid (for a hypothetical daemon “foobar”) to ensure that the daemon cannot be started more than once. This must be implemented in race-free fashion so that the PID file is only updated when it is verified at the same time that the PID previously stored in the PID file no longer exists or belongs to a foreign process.</p>
</li>
<li>
<p>In the daemon process, drop privileges, if possible and applicable.</p>
</li>
<li>
<p>From the daemon process, notify the original process started that initialization is complete. This can be implemented via an unnamed pipe or similar communication channel that is created before the first fork() and hence available in both the original and the daemon process.</p>
</li>
<li>
<p>Call exit() in the original process. The process that invoked the daemon must be able to rely on that this exit() happens after initialization is complete and all external communication channels are established and accessible.</p>
</li>
</ul>

<blockquote>
<p>The discussed library does most of the above-mentioned initialisation steps as it becomes immediately evident that implementation details for some of them heavily dependent on the internal logic of an application itself, so it is not possible to implement them in a universal library. I believe it is not a flaw, though, as the missed parts are safe to implement in an application code.</p>
</blockquote>

<ul>
<li>The Library’s Application Programming Interface</li>
</ul>

<blockquote>
<p>The generic programming interface was loosely modelled after above-mentioned BSD’s daemon() function. The library provides two user available functions (one is, in fact, implemented on top of the other) as well as a set of flags to control a daemon creation behaviour.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>The objective of the library is to hide all the trickery of programming a daemon so you could concentrate on the more creative parts of your application. I hope it does this well.<br>
If you are not only interested in writing a daemon, but also want to make yourself familiar with the techniques which are used to accomplish that, the source code is available. Moreover, I would advise anyone, who starts developing for a UNIX environment to do that, as it shows many intricacies of programming for these platforms.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018">EuroBSDCon 2018 travel report and obligatory pics</a></p>

<blockquote>
<p>This was my first big BSD conference. We also planned - planned might be a big word - thought about doing a devsummit on Friday. Since the people who were in charge of that had a change of plans, I was sure it’d go horribly wrong.<br>
The day before the devsummit and still in the wrong country, I mentioned the hours and venue on the wiki, and booked a reservation for a restaurant.<br>
It turns out that everything was totally fine, and since the devsummit was at the conference venue (that was having tutorials that day), they even had signs pointing at the room we were given. Thanks EuroBSDCon conference organizers!<br>
At the devsummit, we spent some time hacking. A few people came with “travel laptops” without access to anything, like Riastradh, so I gave him access to my own laptop. This didn’t hold very long and I kinda forgot about it, but for a few moments he had access to a NetBSD source tree and an 8 thread, 16GB RAM machine with which to build things.<br>
We had a short introduction and I suggested we take some pictures, so here’s the ones we got. A few people were concerned about privacy, so they’re not pictured. We had small team to hold the camera :-)<br>
At the actual conference days, I stayed at the speaker hotel with the other speakers. I’ve attempted to make conversation with some visibly FreeBSD/OpenBSD people, but didn’t have plans to talk about anything, so there was a lot of just following people silently.<br>
Perhaps for the next conference I’ll prepare a list of questions to random BSD people and then very obviously grab a piece of paper and ask, “what was…”, read a bit from it, and say, “your latest kernel panic?”, I’m sure it’ll be a great conversation starter.<br>
At the conference itself, was pretty cool to have folks like Kirk McKusick give first person accounts of some past events (Kirk gave a talk about governance at FreeBSD), or the second keynote by Ron Broersma.<br>
My own talk was hastily prepared, it was difficult to bring the topic together into a coherent talk. Nevertheless, I managed to talk about stuff for a while 40 minutes, though usually I skip over so many details that I have trouble putting together a sufficiently long talk.<br>
I mentioned some of my coolest bugs to solve (I should probably make a separate article about some!). A few people asked for the slides after the talk, so I guess it wasn’t totally incoherent.<br>
It was really fun to meet some of my favourite NetBSD people. I got to show off my now fairly well working laptop (it took a lot of work by all of us!).<br>
After the conference I came back with a conference cold, and it took a few days to recover from it. Hopefully I didn’t infect too many people on the way back.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/09/23/ghostbsd-tested-on-real-hardware-t410-better-than-trueos/">GhostBSD tested on real hardware T410 – better than TrueOS?</a></p>

<blockquote>
<p>You might have heard about FreeBSD which is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install and some apps as well!</p>
</blockquote>

<blockquote>
<p>Nowadays if you want some of that BSD on your personal desktop how to go about? Well there is a full package or distro called GhostBSD which is based on FreeBSD current with a Mate or XFCE desktop preconfigured. I did try another package called TrueOS before and you can check out my blog post as well.</p>
</blockquote>

<blockquote>
<p>Let’s give it a try on my Lenovo ThinkPad T410. You can download the latest version from <a href="http://ghostbsd.org">ghostbsd.org</a>. Creating a bootable USB drive was surprisingly difficult as rufus did not work and created a corrupted drive. You have to follow this procedure under Windows: download the 2.5GB .iso file and rename the extension to .img. Download Win32 Disk imager and burn the img file to an USB drive and boot from it. You will be able to start a live session and use the onboard setup to install GhostBSD unto a disk.</p>
</blockquote>

<blockquote>
<p>I did encounter some bugs or quirks along the way. The installer failed the first time for some unknown reason but worked on the second attempt. The first boot stopped upon initialization of the USB3 ports (the T410 does not have USB3) but I could use some ‘exit’ command line magic to continue. The second boot worked fine. Audio was only available through headphones, not speakers but that could partially be fixed using the command line again. Lot’s of installed apps did not show up in the start menu and on goes the quirks list.</p>
</blockquote>

<blockquote>
<p>Overall it is still better than TrueOS for me because drivers did work very well and I could address most of the existing bugs.</p>
</blockquote>

<ul>
<li>
<p>On the upside:</p>
</li>
<li>
<p>Free and open source FreeBSD package ready to go</p>
</li>
<li>
<p>Mate or XFCE desktop (Mate is the only option for daily builds)</p>
</li>
<li>
<p>Drivers work fine including LAN, WiFi, video 2D &amp; 3D, audio, etc</p>
</li>
<li>
<p>UFS or ZFS advanced file systems available</p>
</li>
<li>
<p>Some downsides:</p>
</li>
<li>
<p>Less driver and direct app support than Linux</p>
</li>
<li>
<p>Installer and desktop have some quirks and bugs</p>
</li>
<li>
<p>App-store is cumbersome, inferior to TrueOS</p>
</li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://blog.netbsd.org/tnf/entry/eurobsdcon_2018_and_netbsd_sanitizers">EuroBSDCon 2018 and NetBSD sanitizers</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181002175838">New mandoc feature: -T html -O toc</a></li>
<li><a href="https://www.geeklan.co.uk/?p=2307">EuroBSDcon 2018</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/55/">Polish BSD User Group</a></li>
<li><a href="https://garbage.fm/episodes/43">garbage[43]: What year is it?</a></li>
<li><a href="https://thedemoat50.org/">The Demo @ 50</a></li>
<li><a href="https://youtu.be/tG8R5SQGPck?t=660">Microsoft ports DTrace from FreeBSD to Windows 10</a></li>
<li><a href="https://twitter.com/openbsd">OpenBSD joins Twitter</a></li>
<li><a href="https://roy.marples.name/blog/netbsd-curses-ripoffline-improvements">NetBSD curses ripoffline improvements</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2018-October/089717.html">FCP-0101: Deprecating most 10/100 Ethernet drivers</a></li>
<li><a href="https://mail-index.netbsd.org/tech-pkg/2018/10/05/msg020326.html">Announcing the pkgsrc-2018Q3 release</a></li>
<li><a href="http://www.netzbasis.de/openbsd/vmd-debian/index.html">Debian on OpenBSD vmd (without qemu or another debian system)</a></li>
<li><a href="https://github.com/jcs/login_duress">A BSD authentication module for duress passwords (Joshua Stein)</a></li>
<li><a href="https://twitter.com/oshogbovx/status/1019334534935007232?s=03">Disk Price/Performance Analysis</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>DJ - <a href="http://dpaste.com/0YV8WC6#wrap">Zombie ZFS</a></li>
<li>Josua - <a href="http://dpaste.com/25B1EA8">arm tier 1? how to approach it</a></li>
<li>-Gamah - <a href="http://dpaste.com/2SMSGPB">5ghz</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>92: BSD After Midnight</title>
  <link>https://www.bsdnow.tv/92</link>
  <guid isPermaLink="false">9d0d8811-2914-45e0-a34f-9638d2c4e761</guid>
  <pubDate>Wed, 03 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9d0d8811-2914-45e0-a34f-9638d2c4e761.mp3" length="48412372" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Zocker, it's like docker on FreeBSD (http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html)
Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they're working on native FreeBSD support at the moment
This blog post is about a docker-like script, mainly for ease-of-use, that uses only jails and ZFS in the base system
In total, it's 1,500 lines of shell script (https://github.com/toddnni/zocker)
The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration
In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***
Patrol Read in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143285964216970&amp;amp;w=4)
OpenBSD has recently imported some new code to support the Patrol Read (http://www.intel.com/support/motherboards/server/sb/CS-028742.htm) function of some RAID controllers
In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool "scrub" operation
The goal is to protect file integrity by detecting drive failures before they can damage your data
It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***
HAMMER 2 improvements (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html)
DragonFly BSD has been working on the second generation HAMMER FS
It now uses LZ4 compression by default, which we've been big fans of in ZFS
They've also switched to a faster CRC (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html) algorithm, further improving HAMMER's performance, especially (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html) when using iSCSI
***
FreeBSD foundation May update (https://www.freebsdfoundation.org/press/2015mayupdate.pdf)
The FreeBSD foundation has published another update newsletter, detailing some of the things they've been up to lately
In it, you'll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation
Some improvements were also made to FreeBSD's release building process for non-X86 architectures
There's also an AsiaBSDCon recap that covers some of the presentations and the dev events
They also have an accompanying blog post (http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html) where Glen Barber talks about more sysadmin and clusteradm work at NYI
***
Interview - Lucas Holt - questions@midnightbsd.org (mailto:questions@midnightbsd.org) / @midnightbsd (https://twitter.com/midnightbsd)
MidnightBSD
News Roundup
The launchd on train is never coming (http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html)
Replacement of init systems has been quite controversial in the last few years
Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port launchd from OS X (https://en.wikipedia.org/wiki/Launchd)
This blog post details the author's opinion on why he thinks we're never going to have launchd in any of the BSDs
Email us your thoughts on the matter
***
Native SSH comes to… Windows (http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx)
In what may be the first (and last) mention of Microsoft on BSD Now...
They've just recently announced that PowerShell will get native SSH support in the near future
It's not based on the commercial SSH either, it's the same one from OpenBSD that we already use everywhere
Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions
The announcement also promises that they'll be working with the OpenSSH community, so we'll see how many Microsoft-submitted patches make it upstream (or how many donations (http://www.openbsdfoundation.org/index.html) they make)
***
Moving to FreeBSD (http://www.textplain.net/blog/2015/moving-to-freebsd/)
This blog post describes a long-time Linux user's first BSD switching experience
The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd
After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is
He also plans to write about his experience with other BSDs, and is writing some tutorials too - we'll check in with him again later on
***
Feedback/Questions
Adam writes in (http://slexy.org/view/s29hS2cI05)
Dan writes in (http://slexy.org/view/s20VRZYBsw)
Ivan writes in (http://slexy.org/view/s20bumJ5u9)
Josh writes in (http://slexy.org/view/s21BU6Pnka)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, midnightbsd, ghostbsd, zocker, docker, hammerfs, powershell, patrol read, openssh, launchd, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>28: Ghost of Partition</title>
  <link>https://www.bsdnow.tv/28</link>
  <guid isPermaLink="false">dbf43567-8b44-4e0a-a98c-df78dddd551f</guid>
  <pubDate>Wed, 12 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dbf43567-8b44-4e0a-a98c-df78dddd551f.mp3" length="24331945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're at AsiaBSDCon, so it'll be a shorter episode. We've got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven't heard of GhostBSD? Well stay tuned then. There's also a really interesting tutorial on how to serially concatenate disks in NetBSD. We'll be back next week with a normal episode.</itunes:subtitle>
  <itunes:duration>33:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we're at AsiaBSDCon, so it'll be a shorter episode. We've got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven't heard of GhostBSD? Well stay tuned then. There's also a really interesting tutorial on how to serially concatenate disks in NetBSD. We'll be back next week with a normal episode.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Interview - Eric Turgeon - ericturgeon@ghostbsd.org (mailto:ericturgeon@ghostbsd.org) / @GhostBSD1 (https://twitter.com/GhostBSD1)
GhostBSD
Tutorial
Serially concatenating disks in NetBSD (http://www.bsdnow.tv/tutorials/nbsd-disks)
Feedback/Questions
Dave writes in (http://slexy.org/view/s2ff5BOdU0)
Shane writes in (http://slexy.org/view/s2F6j5fVYH)
Rob writes in (http://slexy.org/view/s2GHmy7tuS)
Predrag writes in (http://slexy.org/view/s2uM28feQe)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ghostbsd, disks, management, slice, partition, linux, device, opeth, ghost reveries, name, ericbsd, ericturgeonbsd, opeth, eric turgeon, growing filesystems, vnconfig, disks, disklabel, partitions, disk management</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re at AsiaBSDCon, so it&#39;ll be a shorter episode. We&#39;ve got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven&#39;t heard of GhostBSD? Well stay tuned then. There&#39;s also a really interesting tutorial on how to serially concatenate disks in NetBSD. We&#39;ll be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Eric Turgeon - <a href="mailto:ericturgeon@ghostbsd.org" rel="nofollow">ericturgeon@ghostbsd.org</a> / <a href="https://twitter.com/GhostBSD1" rel="nofollow">@GhostBSD1</a></h2>

<p>GhostBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nbsd-disks" rel="nofollow">Serially concatenating disks in NetBSD</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ff5BOdU0" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s2F6j5fVYH" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s2GHmy7tuS" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s2uM28feQe" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re at AsiaBSDCon, so it&#39;ll be a shorter episode. We&#39;ve got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven&#39;t heard of GhostBSD? Well stay tuned then. There&#39;s also a really interesting tutorial on how to serially concatenate disks in NetBSD. We&#39;ll be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Eric Turgeon - <a href="mailto:ericturgeon@ghostbsd.org" rel="nofollow">ericturgeon@ghostbsd.org</a> / <a href="https://twitter.com/GhostBSD1" rel="nofollow">@GhostBSD1</a></h2>

<p>GhostBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nbsd-disks" rel="nofollow">Serially concatenating disks in NetBSD</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ff5BOdU0" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s2F6j5fVYH" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s2GHmy7tuS" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s2uM28feQe" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
