<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 17:31:51 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Gnome”</title>
    <link>https://www.bsdnow.tv/tags/gnome</link>
    <pubDate>Thu, 08 Jun 2023 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>510: The BSD Slabtop</title>
  <link>https://www.bsdnow.tv/510</link>
  <guid isPermaLink="false">41751de6-aa32-4cde-8fde-ea62d98b6a4d</guid>
  <pubDate>Thu, 08 Jun 2023 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/41751de6-aa32-4cde-8fde-ea62d98b6a4d.mp3" length="44800896" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>AsiaBSDCon 2023 Trip Report, Converting My X201 ThinkPad into a Slabtop, Stream your OpenBSD desktop audio to other devices, The Gnome and Its "Secret Place", ttyload, and more</itunes:subtitle>
  <itunes:duration>46:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>AsiaBSDCon 2023 Trip Report, Converting My X201 ThinkPad into a Slabtop, Stream your OpenBSD desktop audio to other devices, The Gnome and Its "Secret Place", ttyload, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
AsiaBSDCon 2023 Trip Report (https://freebsdfoundation.org/blog/asiabsdcon-2023-trip-report/)
Converting My X201 ThinkPad into a Slabtop (https://bt.ht/slabtop/)
News Roundup
Stream your OpenBSD desktop audio to other devices (https://dataswamp.org/~solene/2023-05-05-openbsd-sound-streaming.html)
The Gnome and Its "Secret Place" (https://www.tuhs.org/pipermail/tuhs/2023-May/028363.html)
ttyload - Linux/Unix color-coded graphical tracking tool for load average in a terminal (https://www.cyberciti.biz/open-source/command-line-hacks/ttyload-color-coded-graphical-tracking-tool-for-unixlinux-load-average-in-a-terminal/)
Beastie Bits
• [OpenIndiana with a Sun Microsystems 22" LCD monitor. Running on a 1.8GHz quad core AMD Phenom 9100e processor, 4Gb RAM, nVidia GEForce GT630.](https://www.reddit.com/r/unix/comments/13otjnt/openindiana_with_a_sun_microsystems_22_lcd/)
• [cron(8) now supports random ranges with steps](https://www.undeadly.org/cgi?action=article;sid=20230507122935&amp;amp;utm_source=bsdweekly)
• [BSDCan 2024 Reorganization](https://mwl.io/archives/22799)
• [Depenguin me](https://depenguin.me/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, asiabsdcon, trip report, Thinkpad, X201, slabtop, stream, audio, desktop, gnome, ttyload</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>AsiaBSDCon 2023 Trip Report, Converting My X201 ThinkPad into a Slabtop, Stream your OpenBSD desktop audio to other devices, The Gnome and Its &quot;Secret Place&quot;, ttyload, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://freebsdfoundation.org/blog/asiabsdcon-2023-trip-report/" rel="nofollow">AsiaBSDCon 2023 Trip Report</a></h3>

<hr>

<h3><a href="https://bt.ht/slabtop/" rel="nofollow">Converting My X201 ThinkPad into a Slabtop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2023-05-05-openbsd-sound-streaming.html" rel="nofollow">Stream your OpenBSD desktop audio to other devices</a></h3>

<hr>

<h3><a href="https://www.tuhs.org/pipermail/tuhs/2023-May/028363.html" rel="nofollow">The Gnome and Its &quot;Secret Place&quot;</a></h3>

<hr>

<h3><a href="https://www.cyberciti.biz/open-source/command-line-hacks/ttyload-color-coded-graphical-tracking-tool-for-unixlinux-load-average-in-a-terminal/" rel="nofollow">ttyload - Linux/Unix color-coded graphical tracking tool for load average in a terminal</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [OpenIndiana with a Sun Microsystems 22&quot; LCD monitor. Running on a 1.8GHz quad core AMD Phenom 9100e processor, 4Gb RAM, nVidia GEForce GT630.](https://www.reddit.com/r/unix/comments/13otjnt/openindiana_with_a_sun_microsystems_22_lcd/)
• [cron(8) now supports random ranges with steps](https://www.undeadly.org/cgi?action=article;sid=20230507122935&amp;utm_source=bsdweekly)
• [BSDCan 2024 Reorganization](https://mwl.io/archives/22799)
• [Depenguin me](https://depenguin.me/)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>AsiaBSDCon 2023 Trip Report, Converting My X201 ThinkPad into a Slabtop, Stream your OpenBSD desktop audio to other devices, The Gnome and Its &quot;Secret Place&quot;, ttyload, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://freebsdfoundation.org/blog/asiabsdcon-2023-trip-report/" rel="nofollow">AsiaBSDCon 2023 Trip Report</a></h3>

<hr>

<h3><a href="https://bt.ht/slabtop/" rel="nofollow">Converting My X201 ThinkPad into a Slabtop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2023-05-05-openbsd-sound-streaming.html" rel="nofollow">Stream your OpenBSD desktop audio to other devices</a></h3>

<hr>

<h3><a href="https://www.tuhs.org/pipermail/tuhs/2023-May/028363.html" rel="nofollow">The Gnome and Its &quot;Secret Place&quot;</a></h3>

<hr>

<h3><a href="https://www.cyberciti.biz/open-source/command-line-hacks/ttyload-color-coded-graphical-tracking-tool-for-unixlinux-load-average-in-a-terminal/" rel="nofollow">ttyload - Linux/Unix color-coded graphical tracking tool for load average in a terminal</a></h3>

<hr>

<h2>Beastie Bits</h2>

<pre><code>• [OpenIndiana with a Sun Microsystems 22&quot; LCD monitor. Running on a 1.8GHz quad core AMD Phenom 9100e processor, 4Gb RAM, nVidia GEForce GT630.](https://www.reddit.com/r/unix/comments/13otjnt/openindiana_with_a_sun_microsystems_22_lcd/)
• [cron(8) now supports random ranges with steps](https://www.undeadly.org/cgi?action=article;sid=20230507122935&amp;utm_source=bsdweekly)
• [BSDCan 2024 Reorganization](https://mwl.io/archives/22799)
• [Depenguin me](https://depenguin.me/)
</code></pre>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>440: BSD Inside Zone</title>
  <link>https://www.bsdnow.tv/440</link>
  <guid isPermaLink="false">ff88573d-93b8-4efc-bf5c-5acd4ac555af</guid>
  <pubDate>Thu, 03 Feb 2022 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ff88573d-93b8-4efc-bf5c-5acd4ac555af.mp3" length="26393592" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the "virtual filesystem switch", and more.</itunes:subtitle>
  <itunes:duration>44:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the "virtual filesystem switch", and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
GhostBSD 22.01 is available (https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available)
Packet Scheduling with Dummynet and FreeBSD (https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/)
News Roundup
Inside zone installation (https://ptribble.blogspot.com/2022/01/inside-zone-installation.html)
Why the FreeBSD Desktop and my Linux Rant (https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/)
How to install Gnome on OpenBSD (https://dataswamp.org/~solene/2021-05-07-openbsd-gnome.html)
The important Unix idea of the "virtual filesystem switch" (https://utcc.utoronto.ca/~cks/space/blog/unix/VFSImportance)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Paul - A Plug (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md)
Rollniak - Bhyve Questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md)
Russell - pf pointers (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md)
***
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, GhostBSD, packet scheduling, dummynet, inside zone, installation, desktop, linux rant, gnome, virtual filesystem switch, vfs </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the &quot;virtual filesystem switch&quot;, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available" rel="nofollow">GhostBSD 22.01 is available</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/" rel="nofollow">Packet Scheduling with Dummynet and FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ptribble.blogspot.com/2022/01/inside-zone-installation.html" rel="nofollow">Inside zone installation</a></h3>

<hr>

<h3><a href="https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/" rel="nofollow">Why the FreeBSD Desktop and my Linux Rant</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-05-07-openbsd-gnome.html" rel="nofollow">How to install Gnome on OpenBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/VFSImportance" rel="nofollow">The important Unix idea of the &quot;virtual filesystem switch&quot;</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md" rel="nofollow">Paul - A Plug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md" rel="nofollow">Rollniak - Bhyve Questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md" rel="nofollow">Russell - pf pointers</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GhostBSD 22.01 is available, Packet Scheduling with Dummynet and FreeBSD, Inside zone installation, Why the FreeBSD Desktop and my Linux Rant, How to install Gnome on OpenBSD, The important Unix idea of the &quot;virtual filesystem switch&quot;, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_22.01.12_iso_is_now_available" rel="nofollow">GhostBSD 22.01 is available</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/packet-scheduling-with-dummynet-and-freebsd/" rel="nofollow">Packet Scheduling with Dummynet and FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ptribble.blogspot.com/2022/01/inside-zone-installation.html" rel="nofollow">Inside zone installation</a></h3>

<hr>

<h3><a href="https://randomnixfix.wordpress.com/2021/10/23/why-the-freebsd-desktop-and-my-linux-rant/" rel="nofollow">Why the FreeBSD Desktop and my Linux Rant</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-05-07-openbsd-gnome.html" rel="nofollow">How to install Gnome on OpenBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/VFSImportance" rel="nofollow">The important Unix idea of the &quot;virtual filesystem switch&quot;</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Paul%20-%20A%20Plug.md" rel="nofollow">Paul - A Plug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Rollniak%20-%20Bhyve%20Questions.md" rel="nofollow">Rollniak - Bhyve Questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/440/feedback/Russell%20-%20pf%20pointers.md" rel="nofollow">Russell - pf pointers</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>431: FreeBSD EC2 Agents</title>
  <link>https://www.bsdnow.tv/431</link>
  <guid isPermaLink="false">3b2d65ab-f8a0-4e12-b6d1-6a257aef7511</guid>
  <pubDate>Thu, 02 Dec 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3b2d65ab-f8a0-4e12-b6d1-6a257aef7511.mp3" length="26124072" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Why use OpenBSD part 2, FreeBSD on the RISC-V Architecture, OpenBSD Webzine Issue 4, Ending up liking GNOME, OPNsense 21.7.5 released, Jenkins with FreeBSD Agents in EC2, and more</itunes:subtitle>
  <itunes:duration>43:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Why use OpenBSD part 2, FreeBSD on the RISC-V Architecture, OpenBSD Webzine Issue 4, Ending up liking GNOME, OPNsense 21.7.5 released, Jenkins with FreeBSD Agents in EC2, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
What every IT person needs to know about OpenBSD Part 2: Why use OpenBSD? (https://blog.apnic.net/2021/11/05/openbsd-part-2-why-use-openbsd/)
Looking Towards the Future: FreeBSD on the RISC-V Architecture (https://klarasystems.com/articles/looking-towards-the-future-freebsd-on-the-risc-v-architecture/)
News Roundup
OpenBSD Webzine Issue 4 (https://webzine.puffy.cafe/issue-4.html)
How I ended up liking GNOME (https://dataswamp.org/~solene/2021-11-10-how-I-ended-liking-gnome.html)
OPNsense 21.7.5 released (https://opnsense.org/opnsense-21-7-5-released/)
Jenkins with FreeBSD Agents in ec2 (https://beerdy.io/2021/10/jenkins-with-freebsd-agents-in-ec2/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Andreas - ZFS and Trim (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Andreas%20-%20ZFS%20and%20Trim.md)
Hamza - swift on the BSDs (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Hamza%20-%20swift%20on%20the%20BSDs.md)
Kendall - how many mirror (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Kendall%20-%20how%20many%20mirrors.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, RISC-V architecture, webzine, gnome, opnsense, jenkins, agents, ec2</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Why use OpenBSD part 2, FreeBSD on the RISC-V Architecture, OpenBSD Webzine Issue 4, Ending up liking GNOME, OPNsense 21.7.5 released, Jenkins with FreeBSD Agents in EC2, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://blog.apnic.net/2021/11/05/openbsd-part-2-why-use-openbsd/" rel="nofollow">What every IT person needs to know about OpenBSD Part 2: Why use OpenBSD?</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/looking-towards-the-future-freebsd-on-the-risc-v-architecture/" rel="nofollow">Looking Towards the Future: FreeBSD on the RISC-V Architecture</a></h3>

<hr>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://webzine.puffy.cafe/issue-4.html" rel="nofollow">OpenBSD Webzine Issue 4</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-11-10-how-I-ended-liking-gnome.html" rel="nofollow">How I ended up liking GNOME</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-21-7-5-released/" rel="nofollow">OPNsense 21.7.5 released</a></h3>

<hr>

<h3><a href="https://beerdy.io/2021/10/jenkins-with-freebsd-agents-in-ec2/" rel="nofollow">Jenkins with FreeBSD Agents in ec2</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Andreas%20-%20ZFS%20and%20Trim.md" rel="nofollow">Andreas - ZFS and Trim</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Hamza%20-%20swift%20on%20the%20BSDs.md" rel="nofollow">Hamza - swift on the BSDs</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Kendall%20-%20how%20many%20mirrors.md" rel="nofollow">Kendall - how many mirror</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Why use OpenBSD part 2, FreeBSD on the RISC-V Architecture, OpenBSD Webzine Issue 4, Ending up liking GNOME, OPNsense 21.7.5 released, Jenkins with FreeBSD Agents in EC2, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://blog.apnic.net/2021/11/05/openbsd-part-2-why-use-openbsd/" rel="nofollow">What every IT person needs to know about OpenBSD Part 2: Why use OpenBSD?</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/looking-towards-the-future-freebsd-on-the-risc-v-architecture/" rel="nofollow">Looking Towards the Future: FreeBSD on the RISC-V Architecture</a></h3>

<hr>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://webzine.puffy.cafe/issue-4.html" rel="nofollow">OpenBSD Webzine Issue 4</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-11-10-how-I-ended-liking-gnome.html" rel="nofollow">How I ended up liking GNOME</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-21-7-5-released/" rel="nofollow">OPNsense 21.7.5 released</a></h3>

<hr>

<h3><a href="https://beerdy.io/2021/10/jenkins-with-freebsd-agents-in-ec2/" rel="nofollow">Jenkins with FreeBSD Agents in ec2</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Andreas%20-%20ZFS%20and%20Trim.md" rel="nofollow">Andreas - ZFS and Trim</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Hamza%20-%20swift%20on%20the%20BSDs.md" rel="nofollow">Hamza - swift on the BSDs</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/431/feedback/Kendall%20-%20how%20many%20mirrors.md" rel="nofollow">Kendall - how many mirror</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>99: BSD Gnow</title>
  <link>https://www.bsdnow.tv/99</link>
  <guid isPermaLink="false">c234f2ea-9f17-4c25-bd28-db41586b32de</guid>
  <pubDate>Wed, 22 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c234f2ea-9f17-4c25-bd28-db41586b32de.mp3" length="57071380" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.</itunes:subtitle>
  <itunes:duration>1:19:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD presents tame (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2)
Theo de Raadt sent out an email detailing OpenBSD's new "tame" subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can't do
When using tame, programs will switch to a "restricted-service operating mode," limiting them to only the things they actually need to do
As for the background: "Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program 'initialization' versus 'main servicing loop.' systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops."
Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking
Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)
Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)
Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.
This is an initial work-in-progress version of tame, so there may be more improvements or further (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143740834710502&amp;amp;w=2) control (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143741052411159&amp;amp;w=2) options added before it hits a release (very specific access policies can sometimes backfire (https://forums.grsecurity.net/viewtopic.php?f=7&amp;amp;t=2522), however)
The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to actually use it)
Kernel bits are in the tree now (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143727335416513&amp;amp;w=2), with userland changes starting to trickle in too
Combined with a myriad of memory protections (http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction), tight privilege separation and (above all else (https://en.wikipedia.org/wiki/OpenBSD_security_features)) good coding practices, tame should further harden the OpenBSD security fortress
Further discussion (https://news.ycombinator.com/item?id=9928221) can (https://www.reddit.com/r/programming/comments/3dsr0t) be (http://undeadly.org/cgi?action=article&amp;amp;sid=20150719000800&amp;amp;mode=flat) found (https://news.ycombinator.com/item?id=9909429) in (https://www.reddit.com/r/linux/comments/3ds66o) the (https://lobste.rs/s/tbbtfs) usual (https://www.reddit.com/r/openbsd/comments/3ds64c) places (https://www.reddit.com/r/BSD/comments/3ds681) you'd expect
***
Using Docker on FreeBSD (https://wiki.freebsd.org/Docker)
With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up
This docker is "the real thing," and isn’t using a virtual machine as the backend - as such, it has some limitations
The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations
When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we're recording this, is where all the action is for 64bit support)
For users on 10.X, there's also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)
Give it a try, let us know how you find it to be compared to other solutions
***
OpenBSD imports doas, removes sudo (http://www.tedunangst.com/flak/post/doas)
OpenBSD has included the ubiquitous "sudo" utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev
The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code
Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)
Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed "do as," with the aim of being more simple and compact
There were concerns that sudo was too big and too complicated, and a quick 'n' dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?
After the initial import, a number of developers began reviewing and improving various bits here and there
You can check out the code (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/) now if you're interested
Command usage (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1) and config syntax (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5) seem pretty straightforward
More discussion (https://news.ycombinator.com/item?id=9914693) on HN
***
What would you like to see in FreeBSD (https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/)
Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they'd like to see
There are over 200 comments that span a wide range of topics, so we'll just cover a few of the more popular requests - check the very long thread if you're interested in more
The top comment says things don't "just work," citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable
Another common one was that there are three firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?
Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well
Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more
At least one user suggested better "marketing" for FreeBSD, with more advocacy and (hopefully) more business adoption
That one really applies to all the BSDs, and regular users (that's you listening to this) can help make it happen for whichever ones you use right now
Maybe Adrian can singlehandedly do all the work and make all the users happy
***
Interview - Ryan Lortie &amp;amp; Baptiste Daroussin
Porting the latest GNOME code to FreeBSD
News Roundup
Introducing resflash (http://stable.rcesoftware.com/resflash/)
If you haven't heard of resflash before, it's "a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way"
One of the major benefits to images like this is the read-only filesystem, so there's no possibility of filesystem corruption if power is lost
There's an optional read-write partition as well, used for any persistent changes you want to make
You can check out the source code on Github (https://github.com/bconway/resflash) or read the main site for more info
***
Jails with iocage (http://pid1.com/posts/post10.html)
There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others
After looking at all the different choices, the author of this blog post eventually settled on iocage (https://github.com/iocage/iocage) for the job
The post walks you through the basic configuration and usage of iocage for creating managing jails
If you've been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***
DragonFly GPU improvements (http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html)
DragonFlyBSD continues to up their graphics game, this time with Intel's ValleyView series of CPUs
These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones
A git branch was created to hold the fixes for now while the last remaining bugs get fixed
Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***
Branchless development (http://www.tedunangst.com/flak/post/branchless-development)
Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them
He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once
"For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else."
The solution, according to him, is bringing all the code the developers are using closer together
One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***
Feedback/Questions
Matthew writes in (http://slexy.org/view/s21yQtBCCK)
Chris writes in (http://slexy.org/view/s21oFA80kY)
Anonymous writes in (http://slexy.org/view/s2JYvTlJlm)
Bill writes in (http://slexy.org/view/s21LXvk53z)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnome, gnome shell, gnome3, puns i will regret forever, doas, sudo, resflash, flashrd, nanobsd, tame, capsicum, iocage, ezjail, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD 5.5 released (http://www.openbsd.org/55.html)
If you ordered (https://https.openbsd.org/cgi-bin/order) a CD set (https://twitter.com/blakkheim/status/461909893813784576) then you've probably had it for a little while already, but OpenBSD has formally announced the public release (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339) of 5.5
This is one of the biggest releases to date, with a very long list of changes and improvements
Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more
The full list of changes (http://www.openbsd.org/plus55.html) is HUGE, be sure to read through it all if you're interested in the details
If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to the upgrade guide (http://www.openbsd.org/faq/upgrade55.html) as there are some very specific steps for this version
Also be sure to apply the errata patches (http://www.openbsd.org/errata55.html) on your new installations... especially those OpenSSL ones (some of which still aren't fixed (http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2) in the other BSDs yet)
On the topic of errata patches, the project is now going to also send them out (signed (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355)) via the announce mailing list (http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce), a very welcome change
Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***
FreeBSD foundation funding highlights (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html)
The FreeBSD foundation posts a new update on how they're spending the money that everyone donates
"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"
During this spring, they want to highlight the new UEFI boot support and newcons (http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html)
There's a lot of details about what exactly UEFI is and why we need it going forward
FreeBSD has also needed some updates to its console to support UTF8 and wide characters
Hopefully this series will continue and we'll get to see what other work is being sponsored
***
OpenSSH without OpenSSL (http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2)
The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional
Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security
This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the new combination (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain) of the Chacha20 stream cipher with Poly1305 for packet integrity
Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs
No support for RSA, DSA or ECDSA public keys - only Ed25519
It also includes a new buffer API (http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2) and a set of wrappers to make it compatible with the existing API
Believe it or not, this was planned before all the heartbleed craziness
Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***
BSDMag's April 2014 issue is out (http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue)
The free monthly BSD magazine has got a new issue available for download
This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online
Anyone can contribute to the magazine, just send the editors an email about what you want to write
No Linux articles this time around, good
***
Interview - David Chisnall - theraven@freebsd.org (mailto:theraven@freebsd.org)
The LLVM/Clang switch, FreeBSD's core team, various topics
Tutorial
RAID in FreeBSD and OpenBSD (http://www.bsdnow.tv/tutorials/raid)
News Roundup
BSDTalk episode 240 (http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html)
Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time
Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more
GNN also talks a little about the Precision Time Protocol (https://en.wikipedia.org/wiki/Precision_Time_Protocol) and how it's different than NTP
Two people (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) we've interviewed (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) talking to each other, awesome
If you're interested in NTP, be sure to see our tutorial (http://www.bsdnow.tv/tutorials/ntpd) too
***
m2k14 trip reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427)
We've got a few more reports from the recent OpenBSD hackathon in Morocco
The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the OpenBSD desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd))
"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"
He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL
Speaking of LibreSSL, there's an article (http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023) all would-be portable version writers should probably read and take into consideration
Jasper Adriaanse also writes (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019) about what he got done over there
He cleaned up and fixed the puppet port to work better with OpenBSD
***
Why you should use FreeBSD on your cloud VPS (https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/)
Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD
Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows
The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options
The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/)
Big changes coming in the way PCBSD manages software
The PBI system, AppCafe and related tools are all going to use pkgng now
The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree
New rating system coming soon and much more
***
Feedback/Questions
Martin writes in (http://slexy.org/view/s21bk2oPuQ)
John writes in (http://slexy.org/view/s2n9fx1Rpw)
Alex writes in (http://slexy.org/view/s2rBBKLA4u)
Goetz writes in (http://slexy.org/view/s20JY6ZI71)
Jarrad writes in (http://slexy.org/view/s20YV5Ohpa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>31: Edgy BSD Users</title>
  <link>https://www.bsdnow.tv/31</link>
  <guid isPermaLink="false">00e67148-6432-475e-a473-fa50bef3a29d</guid>
  <pubDate>Tue, 01 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/00e67148-6432-475e-a473-fa50bef3a29d.mp3" length="49769716" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we'll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</itunes:subtitle>
  <itunes:duration>1:09:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we'll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we'll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Preorders for cool BSD stuff (http://www.amazon.com/gp/aw/d/0321968972/)
The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder
We talked to GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) briefly about it, but he and Kirk (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache) have apparently finally finished the book
"For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD's internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11"
OpenBSD 5.5 preorders (https://https.openbsd.org/cgi-bin/order) are also up, so you can buy a CD set now
You can help support the project, and even get the -release of the OS before it's available publicly
5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***
pkgsrcCon 2014 CFP (http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html)
This year's pkgsrcCon is in London, on June 21st and 22nd
There's a Call For Papers out now, so you can submit your talks
Anything related to pkgsrc is fine, it's pretty informal
Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***
BSDMag issue for March 2014 (http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue)
The monthly BSD magazine releases its newest issue
Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article
The Linux article trend seems to continue... hmm
***
Non-ECC RAM in FreeNAS (http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html)
We've gotten a few questions about ECC RAM with ZFS
Here we've got a surprising blog post about why someone did not go with ECC RAM for his NAS build
The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it's not very widespread in consumer hardware motherboards and it's more expensive
Regular RAM also has "special" issues with ZFS and pool corruption
Long post, so check out the whole thing if you've been considering your memory options and weighing the benefits
***
Interview - Pierre Pronchery - khorben@edgebsd.org (mailto:khorben@edgebsd.org) / @khorben (https://twitter.com/khorben)
EdgeBSD (https://www.youtube.com/watch?v=_D_iaad5rPo) (slides (http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/))
Tutorial
Building an OpenBSD desktop (http://www.bsdnow.tv/tutorials/the-desktop-obsd)
News Roundup
Getting to know your portmgr-lurkers (http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot)
This week we get to hear from Frederic Culot, colut@
Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team
"FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for"
We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***
NetBSD on the Playstation 2 (https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back)
Who doesn't want to run NetBSD on their old PS2?
The PS2 port of NetBSD was sadly removed in 2009, but it has been revived
It's using a slightly unusual MIPS CPU that didn't have much GCC support
Hopefully a bootable kernel will be available soon
***
The FreeBSD Challenge update (http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/)
Our friend from the Linux Foundation continues his FreeBSD switching journey
This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren't working because of his clock being way off
After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases
Maybe he should've just read our NTP tutorial (http://www.bsdnow.tv/tutorials/ntpd)!
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/)
The mount tray icon got lots of updates and fixes
The faulty distribution server has finally been tracked down and... destroyed
New language localization project is in progress
Many many updates to ports and PBIs, new -STABLE builds
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s27d69qHJW)
Patrick writes in (http://slexy.org/view/s21FhLCHbB)
Chris writes in (http://slexy.org/view/s20Hisk3Yw)
Ron writes in (http://slexy.org/view/s20rBZyTLC)
Tyler writes in (http://slexy.org/view/s2s4CxE4gd)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, edgebsd, april fools, zfs, on linux, zpool, zol, zfsonlinux, gnu, linux, rms, richard stallman, gpl, copyright, copyleft, license, debian, centos, gentoo, ubuntu, arch, security, worst puns, desktop, gnome, xfce, gnome3, gnome-shell, ixsystems, ps2, mips, cpu, playstation 2, sony, edgebsd, fosdem, presentation, talk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we&#39;ll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.amazon.com/gp/aw/d/0321968972/" rel="nofollow">Preorders for cool BSD stuff</a></h3>

<ul>
<li>The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">talked to GNN</a> briefly about it, but he and <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk</a> have apparently finally finished the book</li>
<li>&quot;For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD&#39;s internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11&quot;</li>
<li><a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">OpenBSD 5.5 preorders</a> are also up, so you can buy a CD set now</li>
<li>You can help support the project, and even get the -release of the OS before it&#39;s available publicly</li>
<li>5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html" rel="nofollow">pkgsrcCon 2014 CFP</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon is in London, on June 21st and 22nd</li>
<li>There&#39;s a Call For Papers out now, so you can submit your talks</li>
<li>Anything related to pkgsrc is fine, it&#39;s pretty informal</li>
<li>Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue" rel="nofollow">BSDMag issue for March 2014</a></h3>

<ul>
<li>The monthly BSD magazine releases its newest issue</li>
<li>Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article</li>
<li>The Linux article trend seems to continue... hmm
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html" rel="nofollow">Non-ECC RAM in FreeNAS</a></h3>

<ul>
<li>We&#39;ve gotten a few questions about ECC RAM with ZFS</li>
<li>Here we&#39;ve got a surprising blog post about why someone <strong>did not</strong> go with ECC RAM for his NAS build</li>
<li>The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it&#39;s not very widespread in consumer hardware motherboards and it&#39;s more expensive</li>
<li>Regular RAM also has &quot;special&quot; issues with ZFS and pool corruption</li>
<li>Long post, so check out the whole thing if you&#39;ve been considering your memory options and weighing the benefits
***</li>
</ul>

<h2>Interview - Pierre Pronchery - <a href="mailto:khorben@edgebsd.org" rel="nofollow">khorben@edgebsd.org</a> / <a href="https://twitter.com/khorben" rel="nofollow">@khorben</a></h2>

<p><a href="https://www.youtube.com/watch?v=_D_iaad5rPo" rel="nofollow">EdgeBSD</a> (<a href="http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/" rel="nofollow">slides</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">Building an OpenBSD desktop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>This week we get to hear from Frederic Culot, colut@</li>
<li>Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team</li>
<li>&quot;FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for&quot;</li>
<li>We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back" rel="nofollow">NetBSD on the Playstation 2</a></h3>

<ul>
<li>Who doesn&#39;t want to run NetBSD on their old PS2?</li>
<li>The PS2 port of NetBSD was sadly removed in 2009, but it has been revived</li>
<li>It&#39;s using a slightly unusual MIPS CPU that didn&#39;t have much GCC support</li>
<li>Hopefully a bootable kernel will be available soon
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/" rel="nofollow">The FreeBSD Challenge update</a></h3>

<ul>
<li>Our friend from the Linux Foundation continues his FreeBSD switching journey</li>
<li>This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren&#39;t working because of his clock being way off</li>
<li>After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases</li>
<li>Maybe he should&#39;ve just read our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP tutorial</a>!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>The mount tray icon got lots of updates and fixes</li>
<li>The faulty distribution server has finally been tracked down and... destroyed</li>
<li>New language localization project is in progress</li>
<li>Many many updates to ports and PBIs, new -STABLE builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27d69qHJW" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21FhLCHbB" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s20Hisk3Yw" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20rBZyTLC" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2s4CxE4gd" rel="nofollow">Tyler writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we&#39;ll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.amazon.com/gp/aw/d/0321968972/" rel="nofollow">Preorders for cool BSD stuff</a></h3>

<ul>
<li>The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">talked to GNN</a> briefly about it, but he and <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk</a> have apparently finally finished the book</li>
<li>&quot;For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD&#39;s internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11&quot;</li>
<li><a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">OpenBSD 5.5 preorders</a> are also up, so you can buy a CD set now</li>
<li>You can help support the project, and even get the -release of the OS before it&#39;s available publicly</li>
<li>5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html" rel="nofollow">pkgsrcCon 2014 CFP</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon is in London, on June 21st and 22nd</li>
<li>There&#39;s a Call For Papers out now, so you can submit your talks</li>
<li>Anything related to pkgsrc is fine, it&#39;s pretty informal</li>
<li>Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue" rel="nofollow">BSDMag issue for March 2014</a></h3>

<ul>
<li>The monthly BSD magazine releases its newest issue</li>
<li>Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article</li>
<li>The Linux article trend seems to continue... hmm
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html" rel="nofollow">Non-ECC RAM in FreeNAS</a></h3>

<ul>
<li>We&#39;ve gotten a few questions about ECC RAM with ZFS</li>
<li>Here we&#39;ve got a surprising blog post about why someone <strong>did not</strong> go with ECC RAM for his NAS build</li>
<li>The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it&#39;s not very widespread in consumer hardware motherboards and it&#39;s more expensive</li>
<li>Regular RAM also has &quot;special&quot; issues with ZFS and pool corruption</li>
<li>Long post, so check out the whole thing if you&#39;ve been considering your memory options and weighing the benefits
***</li>
</ul>

<h2>Interview - Pierre Pronchery - <a href="mailto:khorben@edgebsd.org" rel="nofollow">khorben@edgebsd.org</a> / <a href="https://twitter.com/khorben" rel="nofollow">@khorben</a></h2>

<p><a href="https://www.youtube.com/watch?v=_D_iaad5rPo" rel="nofollow">EdgeBSD</a> (<a href="http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/" rel="nofollow">slides</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">Building an OpenBSD desktop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>This week we get to hear from Frederic Culot, colut@</li>
<li>Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team</li>
<li>&quot;FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for&quot;</li>
<li>We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back" rel="nofollow">NetBSD on the Playstation 2</a></h3>

<ul>
<li>Who doesn&#39;t want to run NetBSD on their old PS2?</li>
<li>The PS2 port of NetBSD was sadly removed in 2009, but it has been revived</li>
<li>It&#39;s using a slightly unusual MIPS CPU that didn&#39;t have much GCC support</li>
<li>Hopefully a bootable kernel will be available soon
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/" rel="nofollow">The FreeBSD Challenge update</a></h3>

<ul>
<li>Our friend from the Linux Foundation continues his FreeBSD switching journey</li>
<li>This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren&#39;t working because of his clock being way off</li>
<li>After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases</li>
<li>Maybe he should&#39;ve just read our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP tutorial</a>!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>The mount tray icon got lots of updates and fixes</li>
<li>The faulty distribution server has finally been tracked down and... destroyed</li>
<li>New language localization project is in progress</li>
<li>Many many updates to ports and PBIs, new -STABLE builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27d69qHJW" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21FhLCHbB" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s20Hisk3Yw" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20rBZyTLC" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2s4CxE4gd" rel="nofollow">Tyler writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>26: Port Authority</title>
  <link>https://www.bsdnow.tv/26</link>
  <guid isPermaLink="false">0e208963-5f59-446a-902e-9876d96c8f3f</guid>
  <pubDate>Wed, 26 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0e208963-5f59-446a-902e-9876d96c8f3f.mp3" length="65589845" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Tailoring OpenBSD for an old, strange computer (http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html)
The author of this article had an OmniBook 800CT (http://hpmuseum.net/display_item.php?hw=233), which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU
Obviously he had to install some kind of BSD on it!
This post goes through all his efforts of trimming down OpenBSD to work on such a limited device
He goes through the trial and error of "compile, break it, rebuild, try again"
After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***
pkgsrcCon and BSDCan (http://www.pkgsrc.org/pkgsrcCon/2014/)
pkgsrccon is "a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure"
This year it will be on June 21st and 22nd
The schedule (http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html) is still being worked out, so if you want to give a talk, submit it
BSDCan's schedule (https://www.bsdcan.org/2014/schedule/events.en.html) was also announced
We'll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more
Kris' presentation was accepted!
Tons of topics, look forward to the recorded versions of all of them hopefully!
***
Two factor auth with pushover (http://www.tedunangst.com/flak/post/login-pushover)
A new write-up from our friend Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures)
Pushover is "a web hook to smartphone push notification gateway" - you sent a POST to a web server and it sends a code to your phone
His post goes through the steps of editing your login.conf and setting it all up to work
Now you can get a two factor authenticated login for ssh!
***
The status of GNOME 3 on BSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140219085851)
It's no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems
OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use
This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes a screencast (https://www.bsdfrog.org/tmp/undeadly-gnome.webm)
A few recent (http://blogs.gnome.org/mclasen/2014/02/19/on-portability/) posts (http://blogs.gnome.org/desrt/2014/02/19/on-portability/) from some GNOME developers show that they're finally working with the BSD guys to improve portability
The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it's a beautiful thing
This goes right along with our interview today!
***
Interview - Joe Marcus Clark - marcus@freebsd.org (mailto:marcus@freebsd.org)
The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics
Tutorial
The FreeBSD Ports Collection (http://www.bsdnow.tv/tutorials/ports)
News Roundup
DragonflyBSD 3.8 goals and 3.6.1 release (http://bugs.dragonflybsd.org/versions/4)
The Dragonfly team is thinking about what should be in version 3.8
On their bug tracker, it lists some of the things they'd like to get done before then
In the meantime, 3.6.1 (http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html) was released with lots of bugfixes
***
NYCBSDCon 2014 wrap-up piece (http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend)
We've got a nice wrap-up titled "NYCBSDCon 2014 Heats Up a Cold Winter Weekend"
The author also interviews GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) about the conference
There's even a little "beginner introduction" to BSD segment
Includes a mention of the recently-launched journal and lots of pictures from the event
***
FreeBSD and Linux, a comparative analysis (https://www.youtube.com/watch?&amp;amp;v=5mv_oKFzACM#t=418)
GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux
He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs "distros," development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences
Serves as a good introduction you can show your Linux friends
***
PCBSD CFT and weekly digest (http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/)
Upgrade tools have gotten a major rewrite
You have to help test it, there is no choice! Read more here (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/)
How dare Kris be "unimpressed with" freebsd-update and pkgng!?
Various updates and fixes
***
Feedback/Questions
Jeffrey writes in (http://slexy.org/view/s213KxUdVj)
Shane writes in (http://slexy.org/view/s20lwkjLVK)
Ferdinand writes in (http://slexy.org/view/s21DqJs77g)
Curtis writes in (http://slexy.org/view/s20eXKEqJc)
Clint writes in (http://slexy.org/view/s21XMVFuVu)
Peter writes in (http://slexy.org/view/s20Xk05MHe)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, portmgr, ports, pkgng, packages, portsnap, make.conf, tinderbox, portlint, gnome, gnome 3, gnome-shell, omnibook, 800ct, ixsystems, pkgsrc, pkgsrccon, pushover, two factor authentication, bsdcan, 2014, dragonfly mail agent, dma, sendmail, postfix, ssmtp, flashrd, nylug, linux, differences, switching to bsd, presentation, lug, uug, bug, gnu, gpl, fsf, license, debate, nycbsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
