<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 04 May 2026 12:38:46 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Google Summer Of Code”</title>
    <link>https://www.bsdnow.tv/tags/google%20summer%20of%20code</link>
    <pubDate>Thu, 23 Sep 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>421: ZFS eats CPU</title>
  <link>https://www.bsdnow.tv/421</link>
  <guid isPermaLink="false">626e101a-a6c2-43ce-ad87-018474d78971</guid>
  <pubDate>Thu, 23 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/626e101a-a6c2-43ce-ad87-018474d78971.mp3" length="32360040" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Useless use of GNU, Meet the 2021 FreeBSD GSoC Students, historical note on Unix portability, vm86-based venix emulator, ZFS Mysteriously Eating CPU, traceroute gets speed boost, and more </itunes:subtitle>
  <itunes:duration>50:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Useless use of GNU, Meet the 2021 FreeBSD GSoC Students, historical note on Unix portability, vm86-based venix emulator, ZFS Mysteriously Eating CPU, traceroute gets speed boost, and more &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jmmv.dev/2021/08/useless-use-of-gnu.html" target="_blank" rel="nofollow noopener"&gt;Useless use of GNU&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://freebsdfoundation.org/blog/meet-the-2021-freebsd-google-summer-of-code-students/" target="_blank" rel="nofollow noopener"&gt;Meet the 2021 FreeBSD Google Summer of Code Students&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ProgramsVsPortability" target="_blank" rel="nofollow noopener"&gt;Large Unix programs were historically not all that portable between Unixes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;References this article: &lt;a href="https://rubenerd.com/im-not-sure-that-unix-won/" target="_blank" rel="nofollow noopener"&gt;I’m not sure that UNIX won&lt;/a&gt;
***
### &lt;a href="http://bsdimp.blogspot.com/2021/08/a-new-path-vm86-based-venix-emulator.html" target="_blank" rel="nofollow noopener"&gt;A new path: vm86-based venix emulator&lt;/a&gt;
***
### &lt;a href="http://www.brendangregg.com/blog/2021-09-06/zfs-is-mysteriously-eating-my-cpu.html" target="_blank" rel="nofollow noopener"&gt;ZFS Is Mysteriously Eating My CPU&lt;/a&gt;
***
### &lt;a href="http://undeadly.org/cgi?action=article;sid=20210903094704" target="_blank" rel="nofollow noopener"&gt;traceroute(8) gets speed boost&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Al%20-%20TransAtlantic%20Cables.md" target="_blank" rel="nofollow noopener"&gt;Al - TransAtlantic Cables&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Christopher%20-%20NVMe.md" target="_blank" rel="nofollow noopener"&gt;Christopher - NVMe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a target="_blank" rel="nofollow noopener"&gt;JohnnyK - Vivaldi&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, gnu, useless, google summer of code, students, portability, unix history, vm86, venix, emulator, cpu use, cpu usage, traceroute</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Useless use of GNU, Meet the 2021 FreeBSD GSoC Students, historical note on Unix portability, vm86-based venix emulator, ZFS Mysteriously Eating CPU, traceroute gets speed boost, and more </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://jmmv.dev/2021/08/useless-use-of-gnu.html" rel="nofollow">Useless use of GNU</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/meet-the-2021-freebsd-google-summer-of-code-students/" rel="nofollow">Meet the 2021 FreeBSD Google Summer of Code Students</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ProgramsVsPortability" rel="nofollow">Large Unix programs were historically not all that portable between Unixes</a></h3>

<ul>
<li>References this article: <a href="https://rubenerd.com/im-not-sure-that-unix-won/" rel="nofollow">I’m not sure that UNIX won</a>
***
### <a href="http://bsdimp.blogspot.com/2021/08/a-new-path-vm86-based-venix-emulator.html" rel="nofollow">A new path: vm86-based venix emulator</a>
***
### <a href="http://www.brendangregg.com/blog/2021-09-06/zfs-is-mysteriously-eating-my-cpu.html" rel="nofollow">ZFS Is Mysteriously Eating My CPU</a>
***
### <a href="http://undeadly.org/cgi?action=article;sid=20210903094704" rel="nofollow">traceroute(8) gets speed boost</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Al%20-%20TransAtlantic%20Cables.md" rel="nofollow">Al - TransAtlantic Cables</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Christopher%20-%20NVMe.md" rel="nofollow">Christopher - NVMe</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/JohnnyK%2-%20Vivaldi.md" rel="nofollow">JohnnyK - Vivaldi</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Useless use of GNU, Meet the 2021 FreeBSD GSoC Students, historical note on Unix portability, vm86-based venix emulator, ZFS Mysteriously Eating CPU, traceroute gets speed boost, and more </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://jmmv.dev/2021/08/useless-use-of-gnu.html" rel="nofollow">Useless use of GNU</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/meet-the-2021-freebsd-google-summer-of-code-students/" rel="nofollow">Meet the 2021 FreeBSD Google Summer of Code Students</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ProgramsVsPortability" rel="nofollow">Large Unix programs were historically not all that portable between Unixes</a></h3>

<ul>
<li>References this article: <a href="https://rubenerd.com/im-not-sure-that-unix-won/" rel="nofollow">I’m not sure that UNIX won</a>
***
### <a href="http://bsdimp.blogspot.com/2021/08/a-new-path-vm86-based-venix-emulator.html" rel="nofollow">A new path: vm86-based venix emulator</a>
***
### <a href="http://www.brendangregg.com/blog/2021-09-06/zfs-is-mysteriously-eating-my-cpu.html" rel="nofollow">ZFS Is Mysteriously Eating My CPU</a>
***
### <a href="http://undeadly.org/cgi?action=article;sid=20210903094704" rel="nofollow">traceroute(8) gets speed boost</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Al%20-%20TransAtlantic%20Cables.md" rel="nofollow">Al - TransAtlantic Cables</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/Christopher%20-%20NVMe.md" rel="nofollow">Christopher - NVMe</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/421/feedback/JohnnyK%2-%20Vivaldi.md" rel="nofollow">JohnnyK - Vivaldi</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>400: FreeBSD became 13</title>
  <link>https://www.bsdnow.tv/400</link>
  <guid isPermaLink="false">3117fff6-093a-49a0-b8a2-c8628deb83e5</guid>
  <pubDate>Thu, 29 Apr 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3117fff6-093a-49a0-b8a2-c8628deb83e5.mp3" length="40681968" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle> FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</itunes:subtitle>
  <itunes:duration>1:02:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/13.0R/announce/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13.0 R Annoucement&lt;/a&gt;&lt;/h3&gt;

&lt;pre&gt;&lt;code&gt;• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" target="_blank" rel="nofollow noopener"&gt;Enable multi-factor authentication on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" target="_blank" rel="nofollow noopener"&gt;KDE on FreeBSD 2021o2&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" target="_blank" rel="nofollow noopener"&gt;GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.&lt;br&gt;
&amp;gt; The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20210322080633" target="_blank" rel="nofollow noopener"&gt;A working D compiler on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://briancallahan.net/blog/20210320.html" target="_blank" rel="nofollow noopener"&gt;Full Post&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" target="_blank" rel="nofollow noopener"&gt;Vasilis - upgrade question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" target="_blank" rel="nofollow noopener"&gt;Dennis - zfs questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" target="_blank" rel="nofollow noopener"&gt;Daniel Dettlaff - KTLS question&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, freebsd 13, kde, report, google summer of code, gsoc, d compiler</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.0R/announce/" rel="nofollow">FreeBSD 13.0 R Annoucement</a></h3>

<pre><code>• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
</code></pre>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" rel="nofollow">Enable multi-factor authentication on OpenBSD</a></h3>

<blockquote>
<p>In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" rel="nofollow">KDE on FreeBSD 2021o2</a></h3>

<blockquote>
<p>Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" rel="nofollow">GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)</a></h3>

<blockquote>
<p>My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.<br>
The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210322080633" rel="nofollow">A working D compiler on OpenBSD</a></h3>

<blockquote>
<p>Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.</p>

<ul>
<li><a href="https://briancallahan.net/blog/20210320.html" rel="nofollow">Full Post</a>
***</li>
</ul>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" rel="nofollow">Vasilis - upgrade question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" rel="nofollow">Dennis - zfs questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" rel="nofollow">Daniel Dettlaff - KTLS question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.0R/announce/" rel="nofollow">FreeBSD 13.0 R Annoucement</a></h3>

<pre><code>• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
</code></pre>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" rel="nofollow">Enable multi-factor authentication on OpenBSD</a></h3>

<blockquote>
<p>In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" rel="nofollow">KDE on FreeBSD 2021o2</a></h3>

<blockquote>
<p>Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" rel="nofollow">GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)</a></h3>

<blockquote>
<p>My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.<br>
The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210322080633" rel="nofollow">A working D compiler on OpenBSD</a></h3>

<blockquote>
<p>Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.</p>

<ul>
<li><a href="https://briancallahan.net/blog/20210320.html" rel="nofollow">Full Post</a>
***</li>
</ul>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" rel="nofollow">Vasilis - upgrade question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" rel="nofollow">Dennis - zfs questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" rel="nofollow">Daniel Dettlaff - KTLS question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://opnsense.org/" target="_blank" rel="nofollow noopener"&gt;Introducing OPNsense, a pfSense fork&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OPNsense is a new BSD-based firewall project that was &lt;a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" target="_blank" rel="nofollow noopener"&gt;recently started&lt;/a&gt;, forked from the pfSense codebase&lt;/li&gt;
&lt;li&gt;Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" target="_blank" rel="nofollow noopener"&gt;core team&lt;/a&gt; includes a well-known DragonFlyBSD developer&lt;/li&gt;
&lt;li&gt;You can check out their code &lt;a href="https://github.com/opnsense" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; now, or download an image and try it out - &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;let us know&lt;/a&gt; if you do and what you think about it&lt;/li&gt;
&lt;li&gt;They also have a nice wiki and some &lt;a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" target="_blank" rel="nofollow noopener"&gt;instructions on getting started&lt;/a&gt; for new users&lt;/li&gt;
&lt;li&gt;We plan on having them on the show &lt;strong&gt;next week&lt;/strong&gt; to learn a bit more about how the project got started and why you might want to use it - stay tuned
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Code rot and why I chose OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post about rotting codebases - a core banking system in this example&lt;/li&gt;
&lt;li&gt;The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project&lt;/li&gt;
&lt;li&gt;He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born&lt;/li&gt;
&lt;li&gt;Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it&lt;/li&gt;
&lt;li&gt;The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds&lt;/li&gt;
&lt;li&gt;"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."&lt;/li&gt;
&lt;li&gt;It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"&lt;/li&gt;
&lt;li&gt;Look for the phrase "Getting Started" in the blog post for a nice little gem
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" target="_blank" rel="nofollow noopener"&gt;ZFS vs HAMMER FS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the topics we've seen come up from time to time is how &lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;FreeBSD's ZFS&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener"&gt;DragonFly's HAMMER FS&lt;/a&gt; compare to each other&lt;/li&gt;
&lt;li&gt;They both have a lot of features that traditional filesystems lack&lt;/li&gt;
&lt;li&gt;A forum thread was opened for discussion about them both and what they're typically used for&lt;/li&gt;
&lt;li&gt;It compares resource requirements, ideal hardware and pros/cons of each&lt;/li&gt;
&lt;li&gt;Hopefully someone will do another new comparison when HAMMER 2 is finished&lt;/li&gt;
&lt;li&gt;This is not to be confused with the &lt;a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" target="_blank" rel="nofollow noopener"&gt;other "hammer" filesystem&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" target="_blank" rel="nofollow noopener"&gt;Portable OpenNTPD revived&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With ISC's NTPd having so many security vulnerabilities recently, people need an alternative &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;NTP daemon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD has developed &lt;a href="http://openntpd.org/" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt; since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years&lt;/li&gt;
&lt;li&gt;The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version&lt;/li&gt;
&lt;li&gt;Brent Cook, who we've &lt;a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener"&gt;had on the show before&lt;/a&gt; to talk about LibreSSL, decided it was time to fix this&lt;/li&gt;
&lt;li&gt;While looking through the code, he also found &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" target="_blank" rel="nofollow noopener"&gt;some fixes&lt;/a&gt; for the native version as well&lt;/li&gt;
&lt;li&gt;You can grab it from &lt;a href="https://github.com/openntpd-portable/openntpd-portable" target="_blank" rel="nofollow noopener"&gt;Github&lt;/a&gt; now, or just wait for &lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" target="_blank" rel="nofollow noopener"&gt;the updated release&lt;/a&gt; to hit the repos of your OS of choice
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ian Sutton - &lt;a href="mailto:ian@kremlin.cc" target="_blank" rel="nofollow noopener"&gt;ian@kremlin.cc&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" target="_blank" rel="nofollow noopener"&gt;BSD replacements&lt;/a&gt; for &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856" target="_blank" rel="nofollow noopener"&gt;systemd dependencies&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/freebsd/pkg/pull/1113" target="_blank" rel="nofollow noopener"&gt;pkgng adds OS X support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD's next-gen &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;package manager&lt;/a&gt; has just added support for Mac OS X&lt;/li&gt;
&lt;li&gt;Why would you want that? Well.. we don't really know, but it's cool&lt;/li&gt;
&lt;li&gt;The author of the patch &lt;a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" target="_blank" rel="nofollow noopener"&gt;may have some insight&lt;/a&gt; about what his goal is though&lt;/li&gt;
&lt;li&gt;This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc&lt;/li&gt;
&lt;li&gt;There's also the possibility of pkgng being used as a packaging format for MacPorts in the future&lt;/li&gt;
&lt;li&gt;While we're on the topic of pkgng, you can also watch &lt;a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener"&gt;bapt&lt;/a&gt;'s latest presentation about it from ruBSD 2014 - "&lt;a href="http://is.gd/4AvUwt" target="_blank" rel="nofollow noopener"&gt;four years of pkg&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener"&gt;Secure secure shell&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Almost everyone watching BSD Now probably &lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;uses OpenSSH&lt;/a&gt; and has set up a server at one point or another&lt;/li&gt;
&lt;li&gt;This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear&lt;/li&gt;
&lt;li&gt;It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use&lt;/li&gt;
&lt;li&gt;There are also good explanations for all the choices, based both on history and probability&lt;/li&gt;
&lt;li&gt;Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled&lt;/li&gt;
&lt;li&gt;We've also got &lt;a href="http://ssh-comparison.quendi.de/comparison.html" target="_blank" rel="nofollow noopener"&gt;a handy chart&lt;/a&gt; to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" target="_blank" rel="nofollow noopener"&gt;Dissecting OpenBSD's divert(4)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PF has a cool feature that not a lot of people seem to know about: divert&lt;/li&gt;
&lt;li&gt;It lets you send packets to userspace, allowing you to inspect them a lot easier&lt;/li&gt;
&lt;li&gt;This blog post, the first in a series, details all the cool things you can do with divert and how to use it&lt;/li&gt;
&lt;li&gt;A very common example is with intrusion detection systems like Snort
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" target="_blank" rel="nofollow noopener"&gt;Screen recording on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a neat article about a topic we don't cover very often: making video content on BSD&lt;/li&gt;
&lt;li&gt;In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg&lt;/li&gt;
&lt;li&gt;There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing&lt;/li&gt;
&lt;li&gt;It also includes lots of details and helpful screenshots throughout the process&lt;/li&gt;
&lt;li&gt;You should make cool screencasts and send them to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Zx0ktmb" target="_blank" rel="nofollow noopener"&gt;Camio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vVR5Orhh" target="_blank" rel="nofollow noopener"&gt;ezpzy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Ahb5Lxa" target="_blank" rel="nofollow noopener"&gt;Emett writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20oJmveN6" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2cTayMxPk" target="_blank" rel="nofollow noopener"&gt;Laszlo writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" target="_blank" rel="nofollow noopener"&gt;Protocol X97&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;My thoughts echoed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" target="_blank" rel="nofollow noopener"&gt;Vulnerability sample&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>27: BSD Now vs. BSDTalk</title>
  <link>https://www.bsdnow.tv/27</link>
  <guid isPermaLink="false">9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7</guid>
  <pubDate>Wed, 05 Mar 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7.mp3" length="73930325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:42:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener"&gt;FreeBSD and OpenBSD in GSOC2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code is a way to encourage students to write code for open source projects and make some money&lt;/li&gt;
&lt;li&gt;Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a list of things that they'd be interested in someone helping out with&lt;/li&gt;
&lt;li&gt;OpenBSD's want list was &lt;a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener"&gt;also posted&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;DragonflyBSD and NetBSD were sadly not accepted this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener"&gt;Yes, you too can be an evil network overlord&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post about monitoring your network using only free tools&lt;/li&gt;
&lt;li&gt;OpenBSD is a great fit, and has all the stuff you need in the base system or via packages&lt;/li&gt;
&lt;li&gt;It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)&lt;/li&gt;
&lt;li&gt;There's also details about flowd and nfsen, more great tools to make network monitoring easy&lt;/li&gt;
&lt;li&gt;If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener"&gt;BSDMag's February issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The theme is "configuring basic services on OpenBSD 5.4"&lt;/li&gt;
&lt;li&gt;There's also an interview with Peter Hansteen (oh hey...)&lt;/li&gt;
&lt;li&gt;Topics also include locking down SSH, a GIMP lesson, user/group management, and...&lt;/li&gt;
&lt;li&gt;Linux and Solaris articles? Why??
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=139320023202696&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Changes in bcrypt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation&lt;/li&gt;
&lt;li&gt;There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)&lt;/li&gt;
&lt;li&gt;"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."&lt;/li&gt;
&lt;li&gt;As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward&lt;/li&gt;
&lt;li&gt;Lots of specifics in the email, check the full thing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Will Backman - &lt;a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener"&gt;bitgeist@yahoo.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener"&gt;@bsdtalk&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The BSDTalk podcast, BSD advocacy, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;Tracking and cross-compiling -CURRENT (NetBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140223112426" target="_blank" rel="nofollow noopener"&gt;X11 no longer needs root&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Xorg has long since required root privileges to run the main server&lt;/li&gt;
&lt;li&gt;With &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;;m=139245772023497&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent work&lt;/a&gt; from the OpenBSD team, now everything (even KMS) can run as a regular user&lt;/li&gt;
&lt;li&gt;Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.6 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shortly after the huge 6.5 release, we get a routine bugfix update&lt;/li&gt;
&lt;li&gt;Test it out on as many systems as you can&lt;/li&gt;
&lt;li&gt;Check the mailing list for the full bug list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140225072408" target="_blank" rel="nofollow noopener"&gt;Creating an OpenBSD USB drive&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it&lt;/li&gt;
&lt;li&gt;Step by step guide on how you can make your very own&lt;/li&gt;
&lt;li&gt;However, there's some &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140228231258" target="_blank" rel="nofollow noopener"&gt;recent emails&lt;/a&gt; that suggest official USB images may be coming soon... &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139377587526463&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;oh wait&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI updates that allow separate ports from /usr/local&lt;/li&gt;
&lt;li&gt;You need to rebuild pbi-manager if you want to try it out&lt;/li&gt;
&lt;li&gt;Updates and changes to Life Preserver, App Cafe, PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener"&gt;espressowar writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, will backman, bsdtalk, podcast, cross compile, build.sh, portable, portability, cross-build, building a release, google summer of code, gsoc, gsoc2014, 2014, spamd, dd, opensmtpd, tcpdump, packet filtering, monitoring, network, bcrypt, solar designer, ixsystems, usb, bootable, jails, openbsd usb drive, ezjail, jails, bsd jail, x11, openssh, pflow, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
