<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 15 May 2026 09:02:23 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Gsoc”</title>
    <link>https://www.bsdnow.tv/tags/gsoc</link>
    <pubDate>Thu, 31 Mar 2022 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros. The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day.</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros. The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day.</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>448: Controlling Resource Limits</title>
  <link>https://www.bsdnow.tv/448</link>
  <guid isPermaLink="false">8590bd30-1871-4f8d-a3f8-34cb04d9a17f</guid>
  <pubDate>Thu, 31 Mar 2022 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8590bd30-1871-4f8d-a3f8-34cb04d9a17f.mp3" length="26155080" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Controlling Resource Limits with rctl in FreeBSD, It’s always DNS, Google Summer of Code in BSD Projects, Rsync Technical Notes - Q4 2021, Userland CPU frequency scheduling for OpenBSD, and more.</itunes:subtitle>
  <itunes:duration>45:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Controlling Resource Limits with rctl in FreeBSD, It’s always DNS, Google Summer of Code in BSD Projects, Rsync Technical Notes - Q4 2021, Userland CPU frequency scheduling for OpenBSD, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/controlling-resource-limits-with-rctl-in-freebsd/" target="_blank" rel="nofollow noopener"&gt;Controlling Resource Limits with rctl in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/DNSVariabilityProblems" target="_blank" rel="nofollow noopener"&gt;It's DNS. Of course it's DNS, it's always DNS.&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;GSOC&lt;/h3&gt;

&lt;pre&gt;&lt;code&gt;• [Work with FreeBSD in Google Summer of Code](https://freebsdfoundation.org/blog/work-with-freebsd-in-google-summer-of-code/)
• [The NetBSD Foundation is a mentoring organization at Google Summer of Code 2022](https://blog.netbsd.org/tnf/entry/the_netbsd_foundation_is_a)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.rsync.net/resources/notes/2021-q4-rsync.net_technotes.html" target="_blank" rel="nofollow noopener"&gt;Rsync Technical Notes - Q4 2021&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://tildegit.org/solene/obsdfreqd" target="_blank" rel="nofollow noopener"&gt;Userland CPU frequency scheduling for OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://groups.google.com/a/hardenedbsd.org/g/users/c/QUTUJfm30Dg/m/0VNKUeVhHgAJ" target="_blank" rel="nofollow noopener"&gt;Unofficial HardenedBSD liveCD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://2022.eurobsdcon.org/the-call-for-talk-and-presentation-proposals-for-eurobsdcon-2022-is-now-open/" target="_blank" rel="nofollow noopener"&gt;The eurobsdcon 2022 CFP is open&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article;sid=20220319123157" target="_blank" rel="nofollow noopener"&gt;Testing parallel forwarding&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.undeadly.org/cgi?action=article;sid=20220315070043" target="_blank" rel="nofollow noopener"&gt;OpenBSD iwx(4) gains 11ac 80MHz channel support&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20220320115932" target="_blank" rel="nofollow noopener"&gt;OpenBSD/arm64 on Apple M1 systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cambus.net/freebsd-on-the-cubieboard2/" target="_blank" rel="nofollow noopener"&gt;FreeBSD on the CubieBoard2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Eric%20-%20periodic%20notifications.md" target="_blank" rel="nofollow noopener"&gt;Eric - periodic notifications&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Kevin%20-%20no%20question.md" target="_blank" rel="nofollow noopener"&gt;Kevin - no question&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, resource limits, rctl, DNS, rsync, technical notes, gsoc, summer of code, userland, cpu frequency scheduling </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Controlling Resource Limits with rctl in FreeBSD, It’s always DNS, Google Summer of Code in BSD Projects, Rsync Technical Notes - Q4 2021, Userland CPU frequency scheduling for OpenBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/controlling-resource-limits-with-rctl-in-freebsd/" target="_blank" rel="nofollow noopener">Controlling Resource Limits with rctl in FreeBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/DNSVariabilityProblems" target="_blank" rel="nofollow noopener">It's DNS. Of course it's DNS, it's always DNS.</a></h3>

<hr>

<h2>News Roundup</h2>

<h3>GSOC</h3>

<pre><code>• [Work with FreeBSD in Google Summer of Code](https://freebsdfoundation.org/blog/work-with-freebsd-in-google-summer-of-code/)
• [The NetBSD Foundation is a mentoring organization at Google Summer of Code 2022](https://blog.netbsd.org/tnf/entry/the_netbsd_foundation_is_a)
</code></pre>

<hr>

<h3><a href="https://www.rsync.net/resources/notes/2021-q4-rsync.net_technotes.html" target="_blank" rel="nofollow noopener">Rsync Technical Notes - Q4 2021</a></h3>

<hr>

<h3><a href="https://tildegit.org/solene/obsdfreqd" target="_blank" rel="nofollow noopener">Userland CPU frequency scheduling for OpenBSD</a></h3>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://groups.google.com/a/hardenedbsd.org/g/users/c/QUTUJfm30Dg/m/0VNKUeVhHgAJ" target="_blank" rel="nofollow noopener">Unofficial HardenedBSD liveCD</a></li>
<li><a href="https://2022.eurobsdcon.org/the-call-for-talk-and-presentation-proposals-for-eurobsdcon-2022-is-now-open/" target="_blank" rel="nofollow noopener">The eurobsdcon 2022 CFP is open</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20220319123157" target="_blank" rel="nofollow noopener">Testing parallel forwarding</a></li>
<li><a href="https://www.undeadly.org/cgi?action=article;sid=20220315070043" target="_blank" rel="nofollow noopener">OpenBSD iwx(4) gains 11ac 80MHz channel support</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20220320115932" target="_blank" rel="nofollow noopener">OpenBSD/arm64 on Apple M1 systems</a></li>
<li><a href="https://www.cambus.net/freebsd-on-the-cubieboard2/" target="_blank" rel="nofollow noopener">FreeBSD on the CubieBoard2</a></li>
</ul>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Eric%20-%20periodic%20notifications.md" target="_blank" rel="nofollow noopener">Eric - periodic notifications</a><br>
<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Kevin%20-%20no%20question.md" target="_blank" rel="nofollow noopener">Kevin - no question</a></p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Controlling Resource Limits with rctl in FreeBSD, It’s always DNS, Google Summer of Code in BSD Projects, Rsync Technical Notes - Q4 2021, Userland CPU frequency scheduling for OpenBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/controlling-resource-limits-with-rctl-in-freebsd/" target="_blank" rel="nofollow noopener">Controlling Resource Limits with rctl in FreeBSD</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/DNSVariabilityProblems" target="_blank" rel="nofollow noopener">It's DNS. Of course it's DNS, it's always DNS.</a></h3>

<hr>

<h2>News Roundup</h2>

<h3>GSOC</h3>

<pre><code>• [Work with FreeBSD in Google Summer of Code](https://freebsdfoundation.org/blog/work-with-freebsd-in-google-summer-of-code/)
• [The NetBSD Foundation is a mentoring organization at Google Summer of Code 2022](https://blog.netbsd.org/tnf/entry/the_netbsd_foundation_is_a)
</code></pre>

<hr>

<h3><a href="https://www.rsync.net/resources/notes/2021-q4-rsync.net_technotes.html" target="_blank" rel="nofollow noopener">Rsync Technical Notes - Q4 2021</a></h3>

<hr>

<h3><a href="https://tildegit.org/solene/obsdfreqd" target="_blank" rel="nofollow noopener">Userland CPU frequency scheduling for OpenBSD</a></h3>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://groups.google.com/a/hardenedbsd.org/g/users/c/QUTUJfm30Dg/m/0VNKUeVhHgAJ" target="_blank" rel="nofollow noopener">Unofficial HardenedBSD liveCD</a></li>
<li><a href="https://2022.eurobsdcon.org/the-call-for-talk-and-presentation-proposals-for-eurobsdcon-2022-is-now-open/" target="_blank" rel="nofollow noopener">The eurobsdcon 2022 CFP is open</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20220319123157" target="_blank" rel="nofollow noopener">Testing parallel forwarding</a></li>
<li><a href="https://www.undeadly.org/cgi?action=article;sid=20220315070043" target="_blank" rel="nofollow noopener">OpenBSD iwx(4) gains 11ac 80MHz channel support</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20220320115932" target="_blank" rel="nofollow noopener">OpenBSD/arm64 on Apple M1 systems</a></li>
<li><a href="https://www.cambus.net/freebsd-on-the-cubieboard2/" target="_blank" rel="nofollow noopener">FreeBSD on the CubieBoard2</a></li>
</ul>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Eric%20-%20periodic%20notifications.md" target="_blank" rel="nofollow noopener">Eric - periodic notifications</a><br>
<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/448/feedback/Kevin%20-%20no%20question.md" target="_blank" rel="nofollow noopener">Kevin - no question</a></p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>400: FreeBSD became 13</title>
  <link>https://www.bsdnow.tv/400</link>
  <guid isPermaLink="false">3117fff6-093a-49a0-b8a2-c8628deb83e5</guid>
  <pubDate>Thu, 29 Apr 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3117fff6-093a-49a0-b8a2-c8628deb83e5.mp3" length="40681968" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle> FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</itunes:subtitle>
  <itunes:duration>1:02:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/13.0R/announce/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13.0 R Annoucement&lt;/a&gt;&lt;/h3&gt;

&lt;pre&gt;&lt;code&gt;• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" target="_blank" rel="nofollow noopener"&gt;Enable multi-factor authentication on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" target="_blank" rel="nofollow noopener"&gt;KDE on FreeBSD 2021o2&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" target="_blank" rel="nofollow noopener"&gt;GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.&lt;br&gt;
&amp;gt; The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20210322080633" target="_blank" rel="nofollow noopener"&gt;A working D compiler on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://briancallahan.net/blog/20210320.html" target="_blank" rel="nofollow noopener"&gt;Full Post&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" target="_blank" rel="nofollow noopener"&gt;Vasilis - upgrade question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" target="_blank" rel="nofollow noopener"&gt;Dennis - zfs questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" target="_blank" rel="nofollow noopener"&gt;Daniel Dettlaff - KTLS question&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, freebsd 13, kde, report, google summer of code, gsoc, d compiler</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.0R/announce/" target="_blank" rel="nofollow noopener">FreeBSD 13.0 R Annoucement</a></h3>

<pre><code>• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
</code></pre>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" target="_blank" rel="nofollow noopener">Enable multi-factor authentication on OpenBSD</a></h3>

<p>&gt; In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" target="_blank" rel="nofollow noopener">KDE on FreeBSD 2021o2</a></h3>

<p>&gt; Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.</p>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" target="_blank" rel="nofollow noopener">GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)</a></h3>

<p>&gt; My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.<br>
&gt; The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.</p>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210322080633" target="_blank" rel="nofollow noopener">A working D compiler on OpenBSD</a></h3>

<p>&gt; Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.</p>

<ul>
<li>
<a href="https://briancallahan.net/blog/20210320.html" target="_blank" rel="nofollow noopener">Full Post</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" target="_blank" rel="nofollow noopener">Vasilis - upgrade question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" target="_blank" rel="nofollow noopener">Dennis - zfs questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" target="_blank" rel="nofollow noopener">Daniel Dettlaff - KTLS question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13 is here, multi-factor authentication on OpenBSD, KDE on FreeBSD 2021o2, NetBSD GSoC report, a working D compiler on OpenBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.0R/announce/" target="_blank" rel="nofollow noopener">FreeBSD 13.0 R Annoucement</a></h3>

<pre><code>• OpenZFS 2.0 (almost 2.1) is included in 13.0
• Removed support for previously-deprecated algorithms in geli(8).
• The armv8crypto(4) driver now supports AES-GCM which is used by IPsec and kernel TLS.
</code></pre>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-02-06-openbsd-2fa.html" target="_blank" rel="nofollow noopener">Enable multi-factor authentication on OpenBSD</a></h3>

<p>&gt; In this article I will explain how to add a bit more security to your OpenBSD system by adding a requirement for user logging into the system, locally or by ssh. I will explain how to setup 2 factor authentication (2FA) using TOTP on OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/kde/2021/03/26/freebsd2021o2.html" target="_blank" rel="nofollow noopener">KDE on FreeBSD 2021o2</a></h3>

<p>&gt; Gosh, second octant already! Well, let’s take a look at the big things that happened in KDE-on-FreeBSD in these six-and-a-half weeks.</p>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/gsoc_reports_make_system_31" target="_blank" rel="nofollow noopener">GSoC Reports: Make system(3), popen(3) and popenve(3) use posix_spawn(3) internally (Final report)</a></h3>

<p>&gt; My code can be found at github.com/teknokatze/src in the gsoc2020 branch, at the time of writing some of it is still missing. The test facilities and logs can be found in github.com/teknokatze/gsoc2020. A diff can be found at github which will later be split into several patches before it is sent to QA for merging.<br>
&gt; The initial and defined goal of this project was to make system(3) and popen(3) use posix_spawn(3) internally, which had been completed in June. For the second part I was given the task to replace fork+exec calls in our standard shell (sh) in one scenario. Similar to the previous goal we determined through implementation if the initial motivation, to get performance improvements, is correct otherwise we collect metrics for why posix_spawn() in this case should be avoided. This second part meant in practice that I had to add and change code in the kernel, add a new public libc function, and understand shell internals.</p>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20210322080633" target="_blank" rel="nofollow noopener">A working D compiler on OpenBSD</a></h3>

<p>&gt; Dr. Brian Robert Callahan (bcallah@) blogged about his work in getting D compiler(s) working under OpenBSD.</p>

<ul>
<li>
<a href="https://briancallahan.net/blog/20210320.html" target="_blank" rel="nofollow noopener">Full Post</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Vasilis%20-%20upgrade%20question" target="_blank" rel="nofollow noopener">Vasilis - upgrade question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/Dennis%20-%20zfs%20questions" target="_blank" rel="nofollow noopener">Dennis - zfs questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/400/feedback/dmilith%20-%20KTLS" target="_blank" rel="nofollow noopener">Daniel Dettlaff - KTLS question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>314: Swap that Space</title>
  <link>https://www.bsdnow.tv/314</link>
  <guid isPermaLink="false">a98d492a-7c4f-4f70-b6cf-388387042427</guid>
  <pubDate>Wed, 04 Sep 2019 20:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a98d492a-7c4f-4f70-b6cf-388387042427.mp3" length="34897838" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Unix virtual memory when you have no swap space, Dsynth details on Dragonfly, Instant Workstation on FreeBSD, new servers new tech, Experimenting with streaming setups on NetBSD, NetBSD’s progress towards Steam support thanks to GSoC, and more.</itunes:subtitle>
  <itunes:duration>48:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Unix virtual memory when you have no swap space, Dsynth details on Dragonfly, Instant Workstation on FreeBSD, new servers new tech, Experimenting with streaming setups on NetBSD, NetBSD’s progress towards Steam support thanks to GSoC, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/NoSwapConsequence" target="_blank" rel="nofollow noopener"&gt;What has to happen with Unix virtual memory when you have no swap space&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Recently, Artem S. Tashkinov wrote on the Linux kernel mailing list about a Linux problem under memory pressure (via, and threaded here). The specific reproduction instructions involved having low RAM, turning off swap space, and then putting the system under load, and when that happened (emphasis mine):&lt;/p&gt;

&lt;p&gt;&amp;gt; Once you hit a situation when opening a new tab requires more RAM than is currently available, the system will stall hard. You will barely be able to move the mouse pointer. Your disk LED will be flashing incessantly (I'm not entirely sure why). [...]&lt;/p&gt;

&lt;p&gt;&amp;gt; I'm afraid I have bad news for the people snickering at Linux here; if you're running without swap space, you can probably get any Unix to behave this way under memory pressure. If you can't on your particular Unix, I'd actually say that your Unix is probably not letting you get full use out of your RAM.&lt;/p&gt;

&lt;p&gt;&amp;gt; To simplify a bit, we can divide pages of user memory up into anonymous pages and file-backed pages. File-backed pages are what they sound like; they come from some specific file on the filesystem that they can be written out to (if they're dirty) or read back in from. Anonymous pages are not backed by a file, so the only place they can be written out to and read back in from is swap space. Anonymous pages mostly come from dynamic memory allocations and from modifying the program's global variables and data; file backed pages come mostly from mapping files into memory with mmap() and also, crucially, from the code and read-only data of the program.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See link for the rest of the article&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2019/08/27/23398.html" target="_blank" rel="nofollow noopener"&gt;Dsynth details on Dragonfly&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; First, history: DragonFly has had binaries of dports available for download for quite some time.  These were originally built using poudriere, and then using the synth tool put together by John Marino.  Synth worked both to build all software in dports, and as a way to test DragonFly’s SMP capability under extreme load.&lt;/p&gt;

&lt;p&gt;&amp;gt; Matthew Dillon is working on a new version, called dsynth.  It is available now but not yet part of the build.  He’s been working quickly on it and there’s plenty more commits than what I have linked here.  It’s already led to finding more high-load fixes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;dsynth&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; DSynth is basically synth written in C, from scratch.  It is designed to give us a bulk builder in base and be friendly to porting and jails down the line (for now its uses chroot's).&lt;/p&gt;

&lt;p&gt;&amp;gt; The original synth was written by John R. Marino and its basic flow was used in writing this program, but as it was written in ada no code was directly copied.&lt;/p&gt;

&lt;p&gt;&amp;gt; * The intent is to make dsynth compatible with synth's configuration files and directory structure.&lt;/p&gt;

&lt;p&gt;&amp;gt; * This is a work in progress and not yet ready for prime-time.  Pushing so we can get some more eyeballs.  Most of the directives do not yet work (everything, and build works, and 'cleanup' can be used to clean up any dangling mounts).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitweb.dragonflybsd.org/dragonfly.git/blob/HEAD:/usr.bin/dsynth/dsynth.1" target="_blank" rel="nofollow noopener"&gt;dsynth code&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://euroquis.nl/freebsd/2019/08/12/instant-workstation.html" target="_blank" rel="nofollow noopener"&gt;Instant Workstation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Some considerable time ago I wrote up instructions on how to set up a FreeBSD machine with the latest KDE Plasma Desktop. Those instructions, while fairly short (set up X, install the KDE meta-port, .. and that’s it) are a bit fiddly.&lt;/p&gt;

&lt;p&gt;&amp;gt; So – prompted slightly by a Twitter exchange recently – I’ve started a mini-sub-project to script the installation of a desktop environment and the bits needed to support it. To give it at least a modicum of UI, dialog(1) is used to ask for an environment to install and a display manager.&lt;/p&gt;

&lt;p&gt;&amp;gt; The tricky bits – pointed out to me after I started – are hardware support, although a best-effort is better than having nothing, I think.&lt;/p&gt;

&lt;p&gt;&amp;gt; In any case, in a VBox host it’s now down to running a single script and picking Plasma and SDDM to get a usable system for me. Other combinations have not been tested, nor has system-hardware-setup. I’ll probably maintain it for a while and if I have time and energy it’ll be tried with nVidia (those work quite well on FreeBSD) and AMD (not so much, in my experience) graphics cards when I shuffle some machines around.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://raw.githubusercontent.com/adriaandegroot/FreeBSDTools/master/bin/instant-workstation" target="_blank" rel="nofollow noopener"&gt;Here is the script in my GitHub repository with notes-for-myself.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2019/08/26/23396.html" target="_blank" rel="nofollow noopener"&gt;New Servers, new Tech&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Following up on an earlier post, the new servers for DragonFly are in place.   The old 40-core machine used for bulk build, monster, is being retired.  The power efficiency of the new machines is startling.  Incidentally, this is where donations go – infrastructure.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2019-August/358271.html" target="_blank" rel="nofollow noopener"&gt;New servers in the colo, monster is being retired&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We have three new servers in the colo now that will be taking most/all bulk package building duties from monster and the two blades (muscles and pkgbox64) that previously did the work.   Monster will be retired.   The new servers are a dual-socket Xeon (sting) and two 3900X based systems (thor and loki) which all together burn only around half the wattage that monster burned (500W vs 1000W) and 3 times the performance.   That's at least a 6:1 improvement in performance efficiency.&lt;/p&gt;

&lt;p&gt;&amp;gt; With SSD prices down significantly the new machines have all-SSDs.  These new machines allow us to build dports binary packages for release, master, and staged at the same time and reduces the full-on bulk build times for getting all three done down from 2 weeks to 2 days.  It will allow us to more promptly synchronize updates to ports with dports and get binary packages up sooner.&lt;/p&gt;

&lt;p&gt;&amp;gt; Monster, our venerable 48-core quad-socket opteron is being retired.  This was a wonderful dev machine for working on DragonFly's SMP algorithms over the last 6+ years precisely because its inter-core and inter-socket latencies were quite high.  If a SMP algorithm wasn't spot-on, you could feel it.  Over the years DragonFly's performance on monster in doing things like bulk builds increased radically as the SMP algorithms got better and the cores became more and more localized.  This kept monster relevant far longer than I thought it would be.&lt;/p&gt;

&lt;p&gt;&amp;gt; But we are at a point now where improvements in efficiency are just too good to ignore.  Monster's quad-socket opteron (4  x 12 core 6168's) pulls 1000W under full load while a single Ryzen 3900X (12 core / 24 thread) in a server configuration pulls only 150W, and is slightly faster on the same workload to boot.&lt;/p&gt;

&lt;p&gt;&amp;gt; I would like to thank everyone's generous donations over the last few years!  We burned a few thousand on the new machines (as well as the major SSD upgrades we did to the blades) and made very good use of the money, particularly this year as prices for all major components (RAM, SSDs, CPUs, Mobos, etc) have dropped significantly.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dressupgeekout.blogspot.com/2019/08/experimenting-with-streaming-setups-on.html?m=1" target="_blank" rel="nofollow noopener"&gt;Experimenting with streaming setups on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Ever since OBS was successfully ported to NetBSD, I’ve been trying it out, seeing what works and what doesn’t. I’ve only just gotten started, and there’ll definitely be a lot of tweaking going forward.&lt;/p&gt;

&lt;p&gt;&amp;gt; Capturing a specific application’s windows seems to work okay. Capturing an entire display works, too. I actually haven’t tried streaming to Twitch or YouTube yet, but in a previous experiment a few weeks ago, I was able to run a FFmpeg command line and that could stream to Twitch mostly OK.&lt;/p&gt;

&lt;p&gt;&amp;gt; My laptop combined with my external monitor allows me to have a dual-monitor setup wherein the smaller laptop screen can be my “broadcasting station” while the bigger screen is where all the action takes place. I can make OBS visible on all Xfce workspaces, but keep it tucked away on that display only. Altogether, the setup should let me use the big screen for the fun stuff but I can still monitor everything in the small screen.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=NetBSD-Linux-DRM-Ioctl-GSoC2019" target="_blank" rel="nofollow noopener"&gt;NetBSD Made Progress Thanks To GSoC In Its March Towards Steam Support&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Ultimately the goal is to get Valve's Steam client running on NetBSD using their Linux compatibility layer while the focus the past few months with Google Summer of Code 2019 were supporting the necessary DRM ioctls for allowing Linux software running on NetBSD to be able to tap accelerated graphics support.&lt;/p&gt;

&lt;p&gt;&amp;gt; Student developer Surya P spent the summer working on compat_netbsd32 DRM interfaces to allow Direct Rendering Manager using applications running under their Linux compatibility layer.&lt;/p&gt;

&lt;p&gt;&amp;gt; These interfaces have been tested and working as well as updating the "suse131" packages in NetBSD to make use of those interfaces. So the necessary interfaces are now in place for Linux software running on NetBSD to be able to use accelerated graphics though Steam itself isn't yet running on NetBSD with this layer.&lt;/p&gt;

&lt;p&gt;&amp;gt; Those curious about this DRM ioctl GSoC project can learn more from &lt;a href="https://blog.netbsd.org/tnf/entry/gsoc_2019_report_implementation_of" target="_blank" rel="nofollow noopener"&gt;the NetBSD blog&lt;/a&gt;. NetBSD has also been seeing work this summer on Wayland support and better Wine support to ultimately make this BSD a better desktop operating system and potentially a comparable gaming platform to Linux.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/MengTangmu/status/1163265206660694016" target="_blank" rel="nofollow noopener"&gt;FreeBSD in Wellington?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/onewilshire/status/1163792878642114560" target="_blank" rel="nofollow noopener"&gt;FreeBSD on GFE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/onewilshire/status/1166323112620826624" target="_blank" rel="nofollow noopener"&gt;Clarification&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://distrotest.net/" target="_blank" rel="nofollow noopener"&gt;Distrotest.net now with BSDs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10334.html" target="_blank" rel="nofollow noopener"&gt;Lecture: Anykernels meet fuzzing NetBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.khoslaventures.com/wp-content/uploads/SunMicrosystem_bus_plan.pdf" target="_blank" rel="nofollow noopener"&gt;Sun Microsystems business plan from 1982 [pdf]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Alan - &lt;a href="http://dpaste.com/1Z8EGTW" target="_blank" rel="nofollow noopener"&gt;Questions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Rodriguez - &lt;a href="http://dpaste.com/2PZFP4X#wrap" target="_blank" rel="nofollow noopener"&gt;Feedback and a question&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jeff - &lt;a href="http://dpaste.com/02ZM6YE#wrap" target="_blank" rel="nofollow noopener"&gt;OpenZFS follow-up, FreeBSD Adventures&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0314.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, virtual memory, swap, swap space, VM, dsynth, workstation, servers, streaming, steam, gsoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Unix virtual memory when you have no swap space, Dsynth details on Dragonfly, Instant Workstation on FreeBSD, new servers new tech, Experimenting with streaming setups on NetBSD, NetBSD’s progress towards Steam support thanks to GSoC, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/NoSwapConsequence" target="_blank" rel="nofollow noopener">What has to happen with Unix virtual memory when you have no swap space</a></h3>

<p>&gt; Recently, Artem S. Tashkinov wrote on the Linux kernel mailing list about a Linux problem under memory pressure (via, and threaded here). The specific reproduction instructions involved having low RAM, turning off swap space, and then putting the system under load, and when that happened (emphasis mine):</p>

<p>&gt; Once you hit a situation when opening a new tab requires more RAM than is currently available, the system will stall hard. You will barely be able to move the mouse pointer. Your disk LED will be flashing incessantly (I'm not entirely sure why). [...]</p>

<p>&gt; I'm afraid I have bad news for the people snickering at Linux here; if you're running without swap space, you can probably get any Unix to behave this way under memory pressure. If you can't on your particular Unix, I'd actually say that your Unix is probably not letting you get full use out of your RAM.</p>

<p>&gt; To simplify a bit, we can divide pages of user memory up into anonymous pages and file-backed pages. File-backed pages are what they sound like; they come from some specific file on the filesystem that they can be written out to (if they're dirty) or read back in from. Anonymous pages are not backed by a file, so the only place they can be written out to and read back in from is swap space. Anonymous pages mostly come from dynamic memory allocations and from modifying the program's global variables and data; file backed pages come mostly from mapping files into memory with mmap() and also, crucially, from the code and read-only data of the program.</p>

<ul>
<li>See link for the rest of the article</li>
</ul>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/08/27/23398.html" target="_blank" rel="nofollow noopener">Dsynth details on Dragonfly</a></h3>

<p>&gt; First, history: DragonFly has had binaries of dports available for download for quite some time.  These were originally built using poudriere, and then using the synth tool put together by John Marino.  Synth worked both to build all software in dports, and as a way to test DragonFly’s SMP capability under extreme load.</p>

<p>&gt; Matthew Dillon is working on a new version, called dsynth.  It is available now but not yet part of the build.  He’s been working quickly on it and there’s plenty more commits than what I have linked here.  It’s already led to finding more high-load fixes.</p>

<ul>
<li>dsynth</li>
</ul>

<p>&gt; DSynth is basically synth written in C, from scratch.  It is designed to give us a bulk builder in base and be friendly to porting and jails down the line (for now its uses chroot's).</p>

<p>&gt; The original synth was written by John R. Marino and its basic flow was used in writing this program, but as it was written in ada no code was directly copied.</p>

<p>&gt; * The intent is to make dsynth compatible with synth's configuration files and directory structure.</p>

<p>&gt; * This is a work in progress and not yet ready for prime-time.  Pushing so we can get some more eyeballs.  Most of the directives do not yet work (everything, and build works, and 'cleanup' can be used to clean up any dangling mounts).</p>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/blob/HEAD:/usr.bin/dsynth/dsynth.1" target="_blank" rel="nofollow noopener">dsynth code</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/freebsd/2019/08/12/instant-workstation.html" target="_blank" rel="nofollow noopener">Instant Workstation</a></h3>

<p>&gt; Some considerable time ago I wrote up instructions on how to set up a FreeBSD machine with the latest KDE Plasma Desktop. Those instructions, while fairly short (set up X, install the KDE meta-port, .. and that’s it) are a bit fiddly.</p>

<p>&gt; So – prompted slightly by a Twitter exchange recently – I’ve started a mini-sub-project to script the installation of a desktop environment and the bits needed to support it. To give it at least a modicum of UI, dialog(1) is used to ask for an environment to install and a display manager.</p>

<p>&gt; The tricky bits – pointed out to me after I started – are hardware support, although a best-effort is better than having nothing, I think.</p>

<p>&gt; In any case, in a VBox host it’s now down to running a single script and picking Plasma and SDDM to get a usable system for me. Other combinations have not been tested, nor has system-hardware-setup. I’ll probably maintain it for a while and if I have time and energy it’ll be tried with nVidia (those work quite well on FreeBSD) and AMD (not so much, in my experience) graphics cards when I shuffle some machines around.</p>

<ul>
<li><a href="https://raw.githubusercontent.com/adriaandegroot/FreeBSDTools/master/bin/instant-workstation" target="_blank" rel="nofollow noopener">Here is the script in my GitHub repository with notes-for-myself.</a></li>
</ul>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/08/26/23396.html" target="_blank" rel="nofollow noopener">New Servers, new Tech</a></h3>

<p>&gt; Following up on an earlier post, the new servers for DragonFly are in place.   The old 40-core machine used for bulk build, monster, is being retired.  The power efficiency of the new machines is startling.  Incidentally, this is where donations go – infrastructure.</p>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2019-August/358271.html" target="_blank" rel="nofollow noopener">New servers in the colo, monster is being retired</a></li>
</ul>

<p>&gt; We have three new servers in the colo now that will be taking most/all bulk package building duties from monster and the two blades (muscles and pkgbox64) that previously did the work.   Monster will be retired.   The new servers are a dual-socket Xeon (sting) and two 3900X based systems (thor and loki) which all together burn only around half the wattage that monster burned (500W vs 1000W) and 3 times the performance.   That's at least a 6:1 improvement in performance efficiency.</p>

<p>&gt; With SSD prices down significantly the new machines have all-SSDs.  These new machines allow us to build dports binary packages for release, master, and staged at the same time and reduces the full-on bulk build times for getting all three done down from 2 weeks to 2 days.  It will allow us to more promptly synchronize updates to ports with dports and get binary packages up sooner.</p>

<p>&gt; Monster, our venerable 48-core quad-socket opteron is being retired.  This was a wonderful dev machine for working on DragonFly's SMP algorithms over the last 6+ years precisely because its inter-core and inter-socket latencies were quite high.  If a SMP algorithm wasn't spot-on, you could feel it.  Over the years DragonFly's performance on monster in doing things like bulk builds increased radically as the SMP algorithms got better and the cores became more and more localized.  This kept monster relevant far longer than I thought it would be.</p>

<p>&gt; But we are at a point now where improvements in efficiency are just too good to ignore.  Monster's quad-socket opteron (4  x 12 core 6168's) pulls 1000W under full load while a single Ryzen 3900X (12 core / 24 thread) in a server configuration pulls only 150W, and is slightly faster on the same workload to boot.</p>

<p>&gt; I would like to thank everyone's generous donations over the last few years!  We burned a few thousand on the new machines (as well as the major SSD upgrades we did to the blades) and made very good use of the money, particularly this year as prices for all major components (RAM, SSDs, CPUs, Mobos, etc) have dropped significantly.</p>

<hr>

<h3><a href="https://dressupgeekout.blogspot.com/2019/08/experimenting-with-streaming-setups-on.html?m=1" target="_blank" rel="nofollow noopener">Experimenting with streaming setups on NetBSD</a></h3>

<p>&gt; Ever since OBS was successfully ported to NetBSD, I’ve been trying it out, seeing what works and what doesn’t. I’ve only just gotten started, and there’ll definitely be a lot of tweaking going forward.</p>

<p>&gt; Capturing a specific application’s windows seems to work okay. Capturing an entire display works, too. I actually haven’t tried streaming to Twitch or YouTube yet, but in a previous experiment a few weeks ago, I was able to run a FFmpeg command line and that could stream to Twitch mostly OK.</p>

<p>&gt; My laptop combined with my external monitor allows me to have a dual-monitor setup wherein the smaller laptop screen can be my “broadcasting station” while the bigger screen is where all the action takes place. I can make OBS visible on all Xfce workspaces, but keep it tucked away on that display only. Altogether, the setup should let me use the big screen for the fun stuff but I can still monitor everything in the small screen.</p>

<hr>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetBSD-Linux-DRM-Ioctl-GSoC2019" target="_blank" rel="nofollow noopener">NetBSD Made Progress Thanks To GSoC In Its March Towards Steam Support</a></h3>

<p>&gt; Ultimately the goal is to get Valve's Steam client running on NetBSD using their Linux compatibility layer while the focus the past few months with Google Summer of Code 2019 were supporting the necessary DRM ioctls for allowing Linux software running on NetBSD to be able to tap accelerated graphics support.</p>

<p>&gt; Student developer Surya P spent the summer working on compat_netbsd32 DRM interfaces to allow Direct Rendering Manager using applications running under their Linux compatibility layer.</p>

<p>&gt; These interfaces have been tested and working as well as updating the "suse131" packages in NetBSD to make use of those interfaces. So the necessary interfaces are now in place for Linux software running on NetBSD to be able to use accelerated graphics though Steam itself isn't yet running on NetBSD with this layer.</p>

<p>&gt; Those curious about this DRM ioctl GSoC project can learn more from <a href="https://blog.netbsd.org/tnf/entry/gsoc_2019_report_implementation_of" target="_blank" rel="nofollow noopener">the NetBSD blog</a>. NetBSD has also been seeing work this summer on Wayland support and better Wine support to ultimately make this BSD a better desktop operating system and potentially a comparable gaming platform to Linux.</p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/MengTangmu/status/1163265206660694016" target="_blank" rel="nofollow noopener">FreeBSD in Wellington?</a></li>
<li><a href="https://twitter.com/onewilshire/status/1163792878642114560" target="_blank" rel="nofollow noopener">FreeBSD on GFE</a></li>
<li>
<a href="https://twitter.com/onewilshire/status/1166323112620826624" target="_blank" rel="nofollow noopener">Clarification</a> </li>
<li><a href="https://distrotest.net/" target="_blank" rel="nofollow noopener">Distrotest.net now with BSDs</a></li>
<li><a href="https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10334.html" target="_blank" rel="nofollow noopener">Lecture: Anykernels meet fuzzing NetBSD</a></li>
<li><a href="https://www.khoslaventures.com/wp-content/uploads/SunMicrosystem_bus_plan.pdf" target="_blank" rel="nofollow noopener">Sun Microsystems business plan from 1982 [pdf]</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Alan - <a href="http://dpaste.com/1Z8EGTW" target="_blank" rel="nofollow noopener">Questions</a>
</li>
<li>Rodriguez - <a href="http://dpaste.com/2PZFP4X#wrap" target="_blank" rel="nofollow noopener">Feedback and a question</a>
</li>
<li>Jeff - <a href="http://dpaste.com/02ZM6YE#wrap" target="_blank" rel="nofollow noopener">OpenZFS follow-up, FreeBSD Adventures</a>
</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
</li>
</ul>

<hr>


    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0314.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</source>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Unix virtual memory when you have no swap space, Dsynth details on Dragonfly, Instant Workstation on FreeBSD, new servers new tech, Experimenting with streaming setups on NetBSD, NetBSD’s progress towards Steam support thanks to GSoC, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/NoSwapConsequence" target="_blank" rel="nofollow noopener">What has to happen with Unix virtual memory when you have no swap space</a></h3>

<p>&gt; Recently, Artem S. Tashkinov wrote on the Linux kernel mailing list about a Linux problem under memory pressure (via, and threaded here). The specific reproduction instructions involved having low RAM, turning off swap space, and then putting the system under load, and when that happened (emphasis mine):</p>

<p>&gt; Once you hit a situation when opening a new tab requires more RAM than is currently available, the system will stall hard. You will barely be able to move the mouse pointer. Your disk LED will be flashing incessantly (I'm not entirely sure why). [...]</p>

<p>&gt; I'm afraid I have bad news for the people snickering at Linux here; if you're running without swap space, you can probably get any Unix to behave this way under memory pressure. If you can't on your particular Unix, I'd actually say that your Unix is probably not letting you get full use out of your RAM.</p>

<p>&gt; To simplify a bit, we can divide pages of user memory up into anonymous pages and file-backed pages. File-backed pages are what they sound like; they come from some specific file on the filesystem that they can be written out to (if they're dirty) or read back in from. Anonymous pages are not backed by a file, so the only place they can be written out to and read back in from is swap space. Anonymous pages mostly come from dynamic memory allocations and from modifying the program's global variables and data; file backed pages come mostly from mapping files into memory with mmap() and also, crucially, from the code and read-only data of the program.</p>

<ul>
<li>See link for the rest of the article</li>
</ul>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/08/27/23398.html" target="_blank" rel="nofollow noopener">Dsynth details on Dragonfly</a></h3>

<p>&gt; First, history: DragonFly has had binaries of dports available for download for quite some time.  These were originally built using poudriere, and then using the synth tool put together by John Marino.  Synth worked both to build all software in dports, and as a way to test DragonFly’s SMP capability under extreme load.</p>

<p>&gt; Matthew Dillon is working on a new version, called dsynth.  It is available now but not yet part of the build.  He’s been working quickly on it and there’s plenty more commits than what I have linked here.  It’s already led to finding more high-load fixes.</p>

<ul>
<li>dsynth</li>
</ul>

<p>&gt; DSynth is basically synth written in C, from scratch.  It is designed to give us a bulk builder in base and be friendly to porting and jails down the line (for now its uses chroot's).</p>

<p>&gt; The original synth was written by John R. Marino and its basic flow was used in writing this program, but as it was written in ada no code was directly copied.</p>

<p>&gt; * The intent is to make dsynth compatible with synth's configuration files and directory structure.</p>

<p>&gt; * This is a work in progress and not yet ready for prime-time.  Pushing so we can get some more eyeballs.  Most of the directives do not yet work (everything, and build works, and 'cleanup' can be used to clean up any dangling mounts).</p>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/blob/HEAD:/usr.bin/dsynth/dsynth.1" target="_blank" rel="nofollow noopener">dsynth code</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://euroquis.nl/freebsd/2019/08/12/instant-workstation.html" target="_blank" rel="nofollow noopener">Instant Workstation</a></h3>

<p>&gt; Some considerable time ago I wrote up instructions on how to set up a FreeBSD machine with the latest KDE Plasma Desktop. Those instructions, while fairly short (set up X, install the KDE meta-port, .. and that’s it) are a bit fiddly.</p>

<p>&gt; So – prompted slightly by a Twitter exchange recently – I’ve started a mini-sub-project to script the installation of a desktop environment and the bits needed to support it. To give it at least a modicum of UI, dialog(1) is used to ask for an environment to install and a display manager.</p>

<p>&gt; The tricky bits – pointed out to me after I started – are hardware support, although a best-effort is better than having nothing, I think.</p>

<p>&gt; In any case, in a VBox host it’s now down to running a single script and picking Plasma and SDDM to get a usable system for me. Other combinations have not been tested, nor has system-hardware-setup. I’ll probably maintain it for a while and if I have time and energy it’ll be tried with nVidia (those work quite well on FreeBSD) and AMD (not so much, in my experience) graphics cards when I shuffle some machines around.</p>

<ul>
<li><a href="https://raw.githubusercontent.com/adriaandegroot/FreeBSDTools/master/bin/instant-workstation" target="_blank" rel="nofollow noopener">Here is the script in my GitHub repository with notes-for-myself.</a></li>
</ul>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/08/26/23396.html" target="_blank" rel="nofollow noopener">New Servers, new Tech</a></h3>

<p>&gt; Following up on an earlier post, the new servers for DragonFly are in place.   The old 40-core machine used for bulk build, monster, is being retired.  The power efficiency of the new machines is startling.  Incidentally, this is where donations go – infrastructure.</p>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2019-August/358271.html" target="_blank" rel="nofollow noopener">New servers in the colo, monster is being retired</a></li>
</ul>

<p>&gt; We have three new servers in the colo now that will be taking most/all bulk package building duties from monster and the two blades (muscles and pkgbox64) that previously did the work.   Monster will be retired.   The new servers are a dual-socket Xeon (sting) and two 3900X based systems (thor and loki) which all together burn only around half the wattage that monster burned (500W vs 1000W) and 3 times the performance.   That's at least a 6:1 improvement in performance efficiency.</p>

<p>&gt; With SSD prices down significantly the new machines have all-SSDs.  These new machines allow us to build dports binary packages for release, master, and staged at the same time and reduces the full-on bulk build times for getting all three done down from 2 weeks to 2 days.  It will allow us to more promptly synchronize updates to ports with dports and get binary packages up sooner.</p>

<p>&gt; Monster, our venerable 48-core quad-socket opteron is being retired.  This was a wonderful dev machine for working on DragonFly's SMP algorithms over the last 6+ years precisely because its inter-core and inter-socket latencies were quite high.  If a SMP algorithm wasn't spot-on, you could feel it.  Over the years DragonFly's performance on monster in doing things like bulk builds increased radically as the SMP algorithms got better and the cores became more and more localized.  This kept monster relevant far longer than I thought it would be.</p>

<p>&gt; But we are at a point now where improvements in efficiency are just too good to ignore.  Monster's quad-socket opteron (4  x 12 core 6168's) pulls 1000W under full load while a single Ryzen 3900X (12 core / 24 thread) in a server configuration pulls only 150W, and is slightly faster on the same workload to boot.</p>

<p>&gt; I would like to thank everyone's generous donations over the last few years!  We burned a few thousand on the new machines (as well as the major SSD upgrades we did to the blades) and made very good use of the money, particularly this year as prices for all major components (RAM, SSDs, CPUs, Mobos, etc) have dropped significantly.</p>

<hr>

<h3><a href="https://dressupgeekout.blogspot.com/2019/08/experimenting-with-streaming-setups-on.html?m=1" target="_blank" rel="nofollow noopener">Experimenting with streaming setups on NetBSD</a></h3>

<p>&gt; Ever since OBS was successfully ported to NetBSD, I’ve been trying it out, seeing what works and what doesn’t. I’ve only just gotten started, and there’ll definitely be a lot of tweaking going forward.</p>

<p>&gt; Capturing a specific application’s windows seems to work okay. Capturing an entire display works, too. I actually haven’t tried streaming to Twitch or YouTube yet, but in a previous experiment a few weeks ago, I was able to run a FFmpeg command line and that could stream to Twitch mostly OK.</p>

<p>&gt; My laptop combined with my external monitor allows me to have a dual-monitor setup wherein the smaller laptop screen can be my “broadcasting station” while the bigger screen is where all the action takes place. I can make OBS visible on all Xfce workspaces, but keep it tucked away on that display only. Altogether, the setup should let me use the big screen for the fun stuff but I can still monitor everything in the small screen.</p>

<hr>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetBSD-Linux-DRM-Ioctl-GSoC2019" target="_blank" rel="nofollow noopener">NetBSD Made Progress Thanks To GSoC In Its March Towards Steam Support</a></h3>

<p>&gt; Ultimately the goal is to get Valve's Steam client running on NetBSD using their Linux compatibility layer while the focus the past few months with Google Summer of Code 2019 were supporting the necessary DRM ioctls for allowing Linux software running on NetBSD to be able to tap accelerated graphics support.</p>

<p>&gt; Student developer Surya P spent the summer working on compat_netbsd32 DRM interfaces to allow Direct Rendering Manager using applications running under their Linux compatibility layer.</p>

<p>&gt; These interfaces have been tested and working as well as updating the "suse131" packages in NetBSD to make use of those interfaces. So the necessary interfaces are now in place for Linux software running on NetBSD to be able to use accelerated graphics though Steam itself isn't yet running on NetBSD with this layer.</p>

<p>&gt; Those curious about this DRM ioctl GSoC project can learn more from <a href="https://blog.netbsd.org/tnf/entry/gsoc_2019_report_implementation_of" target="_blank" rel="nofollow noopener">the NetBSD blog</a>. NetBSD has also been seeing work this summer on Wayland support and better Wine support to ultimately make this BSD a better desktop operating system and potentially a comparable gaming platform to Linux.</p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/MengTangmu/status/1163265206660694016" target="_blank" rel="nofollow noopener">FreeBSD in Wellington?</a></li>
<li><a href="https://twitter.com/onewilshire/status/1163792878642114560" target="_blank" rel="nofollow noopener">FreeBSD on GFE</a></li>
<li>
<a href="https://twitter.com/onewilshire/status/1166323112620826624" target="_blank" rel="nofollow noopener">Clarification</a> </li>
<li><a href="https://distrotest.net/" target="_blank" rel="nofollow noopener">Distrotest.net now with BSDs</a></li>
<li><a href="https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10334.html" target="_blank" rel="nofollow noopener">Lecture: Anykernels meet fuzzing NetBSD</a></li>
<li><a href="https://www.khoslaventures.com/wp-content/uploads/SunMicrosystem_bus_plan.pdf" target="_blank" rel="nofollow noopener">Sun Microsystems business plan from 1982 [pdf]</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Alan - <a href="http://dpaste.com/1Z8EGTW" target="_blank" rel="nofollow noopener">Questions</a>
</li>
<li>Rodriguez - <a href="http://dpaste.com/2PZFP4X#wrap" target="_blank" rel="nofollow noopener">Feedback and a question</a>
</li>
<li>Jeff - <a href="http://dpaste.com/02ZM6YE#wrap" target="_blank" rel="nofollow noopener">OpenZFS follow-up, FreeBSD Adventures</a>
</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">feedback@bsdnow.tv</a>
</li>
</ul>

<hr>


    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0314.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</source>]]>
  </itunes:summary>
</item>
<item>
  <title>87: On the List</title>
  <link>https://www.bsdnow.tv/87</link>
  <guid isPermaLink="false">56f4b27b-9384-4cb9-9877-d825f62815a7</guid>
  <pubDate>Wed, 29 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/56f4b27b-9384-4cb9-9877-d825f62815a7.mp3" length="58344340" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142990524317070&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;New PAE support in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has just added &lt;a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" target="_blank" rel="nofollow noopener"&gt;Physical Address Extention&lt;/a&gt; support to the i386 architecture, but it's probably not what you'd think of when you hear the term&lt;/li&gt;
&lt;li&gt;In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that&lt;/li&gt;
&lt;li&gt;Instead, this change specifically allows the system to use the &lt;a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" target="_blank" rel="nofollow noopener"&gt;No-eXecute Bit&lt;/a&gt; of the processor for the userland, further hardening the in-place memory protections&lt;/li&gt;
&lt;li&gt;Other operating systems enable the CPU feature without doing anything to the &lt;a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" target="_blank" rel="nofollow noopener"&gt;page table entries&lt;/a&gt;, so they &lt;strong&gt;do get&lt;/strong&gt; the available memory expansion, but &lt;strong&gt;don't get&lt;/strong&gt; the potential security benefit&lt;/li&gt;
&lt;li&gt;As we discussed in a &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;previous episode&lt;/a&gt;, the AMD64 platform already saw some major W&lt;sup&gt;X&lt;/sup&gt; kernel &lt;strong&gt;and&lt;/strong&gt; userland improvements - the i386 kernel reworking will begin shortly&lt;/li&gt;
&lt;li&gt;Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W&lt;sup&gt;X&lt;/sup&gt; that was already there&lt;/li&gt;
&lt;li&gt;The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/nahannisys/status/591733319357730816" target="_blank" rel="nofollow noopener"&gt;Booting Windows in bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work on FreeBSD's &lt;a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener"&gt;bhyve&lt;/a&gt; continues, and a big addition is on the way&lt;/li&gt;
&lt;li&gt;Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, &lt;em&gt;no Windows&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter&lt;/li&gt;
&lt;li&gt;Graphics emulation is still in the works; this image was taken by booting headless and using RDP&lt;/li&gt;
&lt;li&gt;A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)&lt;/li&gt;
&lt;li&gt;Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out&lt;/li&gt;
&lt;li&gt;Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 0.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;MidnightBSD is a smaller project we've not covered a lot on the show before&lt;/li&gt;
&lt;li&gt;It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use&lt;/li&gt;
&lt;li&gt;They also have their own, smaller version of FreeBSD ports, called "mports"&lt;/li&gt;
&lt;li&gt;If you're already using it, this new version is mainly a security and bugfix release&lt;/li&gt;
&lt;li&gt;It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions&lt;/li&gt;
&lt;li&gt;You can check &lt;a href="http://www.midnightbsd.org/about/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; for more information about the project&lt;/li&gt;
&lt;li&gt;We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989267412968&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;OpenBSD rewrites the file utility&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with the traditional &lt;a href="https://en.wikipedia.org/wiki/File_%28command%29" target="_blank" rel="nofollow noopener"&gt;file&lt;/a&gt; command - it's been around &lt;a href="http://darwinsys.com/file/" target="_blank" rel="nofollow noopener"&gt;since the 1970s&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;For anyone who doesn't know, it's used to determine what type of file something actually is&lt;/li&gt;
&lt;li&gt;This tool doesn't see a lot of development these days, and it's had its share of security issues as well&lt;/li&gt;
&lt;li&gt;Some of those security issues &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141857001403570&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;remain&lt;/a&gt; &lt;a href="https://www.marc.info/?l=freebsd-security&amp;amp;m=142980545021888&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;unfixed&lt;/a&gt; in various BSDs &lt;strong&gt;even today&lt;/strong&gt;, despite being publicly known for a while&lt;/li&gt;
&lt;li&gt;It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it&lt;/li&gt;
&lt;li&gt;When you think about it, file was technically &lt;em&gt;designed&lt;/em&gt; to be used on untrusted files&lt;/li&gt;
&lt;li&gt;OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny&lt;/li&gt;
&lt;li&gt;This new version will, by default, run &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014212727213&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;as an unprivileged user&lt;/a&gt; with no shell, and in a &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014276127454&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;systrace sandbox&lt;/a&gt;, strictly limiting what system calls can be made&lt;/li&gt;
&lt;li&gt;With these two things combined, it should drastically reduce the damage a malicious file could potentially do&lt;/li&gt;
&lt;li&gt;Ian Darwin, the original author of the utility, &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989483913635&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;saw the commit and replied&lt;/a&gt;, in what may be a moment in BSD history to remember&lt;/li&gt;
&lt;li&gt;It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version&lt;/li&gt;
&lt;li&gt;Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Christos Zoulas - &lt;a href="mailto:christos@netbsd.org" target="_blank" rel="nofollow noopener"&gt;christos@netbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" target="_blank" rel="nofollow noopener"&gt;blacklistd&lt;/a&gt; and NetBSD advocacy&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" target="_blank" rel="nofollow noopener"&gt;GSoC-accepted BSD projects&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list&lt;/li&gt;
&lt;li&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/SummerOfCode2015Projects" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. &lt;strong&gt;memory compression and deduplication&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD's &lt;a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp;amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... &lt;strong&gt;porting HAMMER FS to OpenBSD&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;We'll be sure to keep you up to date on developments from both projects&lt;/li&gt;
&lt;li&gt;Hopefully the other BSDs will make the cut too next year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on the Gumstix Duovero&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based &lt;a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" target="_blank" rel="nofollow noopener"&gt;computer-on-module&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They actually look more like a stick of RAM than a mini-computer&lt;/li&gt;
&lt;li&gt;This article shows you how to build a FreeBSD -CURRENT image to run on them, using &lt;a href="https://github.com/freebsd/crochet" target="_blank" rel="nofollow noopener"&gt;crochet-freebsd&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" target="_blank" rel="nofollow noopener"&gt;EU study recommends OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools&lt;/li&gt;
&lt;li&gt;This is especially important, in all countries, after the mass surveillance documents came out &lt;/li&gt;
&lt;li&gt;"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."&lt;/li&gt;
&lt;li&gt;The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on&lt;/li&gt;
&lt;li&gt;Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"&lt;/li&gt;
&lt;li&gt;Reddit, Undeadly and Hacker News also &lt;a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" target="_blank" rel="nofollow noopener"&gt;had&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150427093546" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=9445831" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt;, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with &lt;a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" target="_blank" rel="nofollow noopener"&gt;Voxer&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" target="_blank" rel="nofollow noopener"&gt;M:Tier&lt;/a&gt; before
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD workflow with Git&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too&lt;/li&gt;
&lt;li&gt;This mailing list post talks about interacting &lt;a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" target="_blank" rel="nofollow noopener"&gt;between&lt;/a&gt; the official source repository and the Git mirror&lt;/li&gt;
&lt;li&gt;This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vjh3ogvG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20GMcWvKE" target="_blank" rel="nofollow noopener"&gt;Bryan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21M1imT3d" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s25ScxQSwb" target="_blank" rel="nofollow noopener"&gt;Charles writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, blacklistd, file, pae, w^x, aslr, bhyve, windows, efi, rdp, gumstix, duovero, midnightbsd, coreclr, gsoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"></a><a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142990524317070&amp;w=2" target="_blank" rel="nofollow noopener">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" target="_blank" rel="nofollow noopener">Physical Address Extention</a> support to the i386 architecture, but it's probably not what you'd think of when you hear the term</li>
<li>In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" target="_blank" rel="nofollow noopener">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" target="_blank" rel="nofollow noopener">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don't get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" target="_blank" rel="nofollow noopener">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD's <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em>
</li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we've not covered a lot on the show before</li>
<li>It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called "mports"</li>
<li>If you're already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" target="_blank" rel="nofollow noopener">their site</a> for more information about the project</li>
<li>We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142989267412968&amp;w=4" target="_blank" rel="nofollow noopener">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We're all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" target="_blank" rel="nofollow noopener">file</a> command - it's been around <a href="http://darwinsys.com/file/" target="_blank" rel="nofollow noopener">since the 1970s</a>
</li>
<li>For anyone who doesn't know, it's used to determine what type of file something actually is</li>
<li>This tool doesn't see a lot of development these days, and it's had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&amp;m=141857001403570&amp;w=2" target="_blank" rel="nofollow noopener">remain</a> <a href="https://www.marc.info/?l=freebsd-security&amp;m=142980545021888&amp;w=2" target="_blank" rel="nofollow noopener">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=143014212727213&amp;w=2" target="_blank" rel="nofollow noopener">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=143014276127454&amp;w=2" target="_blank" rel="nofollow noopener">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142989483913635&amp;w=4" target="_blank" rel="nofollow noopener">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" target="_blank" rel="nofollow noopener">christos@netbsd.org</a>
</h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" target="_blank" rel="nofollow noopener">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" target="_blank" rel="nofollow noopener">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD's <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" target="_blank" rel="nofollow noopener">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong>
</li>
<li>OpenBSD's <a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong>
</li>
<li>We'll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" target="_blank" rel="nofollow noopener">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" target="_blank" rel="nofollow noopener">computer-on-module</a>
</li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" target="_blank" rel="nofollow noopener">crochet-freebsd</a>
</li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" target="_blank" rel="nofollow noopener">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" target="_blank" rel="nofollow noopener">had</a> <a href="http://undeadly.org/cgi?action=article&amp;sid=20150427093546" target="_blank" rel="nofollow noopener">some</a> <a href="https://news.ycombinator.com/item?id=9445831" target="_blank" rel="nofollow noopener">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" target="_blank" rel="nofollow noopener">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" target="_blank" rel="nofollow noopener">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" target="_blank" rel="nofollow noopener">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" target="_blank" rel="nofollow noopener">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" target="_blank" rel="nofollow noopener">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li>
<a href="http://slexy.org/view/s25ScxQSwb" target="_blank" rel="nofollow noopener">Charles writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"></a><a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142990524317070&amp;w=2" target="_blank" rel="nofollow noopener">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" target="_blank" rel="nofollow noopener">Physical Address Extention</a> support to the i386 architecture, but it's probably not what you'd think of when you hear the term</li>
<li>In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" target="_blank" rel="nofollow noopener">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" target="_blank" rel="nofollow noopener">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don't get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" target="_blank" rel="nofollow noopener">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD's <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em>
</li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we've not covered a lot on the show before</li>
<li>It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called "mports"</li>
<li>If you're already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" target="_blank" rel="nofollow noopener">their site</a> for more information about the project</li>
<li>We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142989267412968&amp;w=4" target="_blank" rel="nofollow noopener">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We're all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" target="_blank" rel="nofollow noopener">file</a> command - it's been around <a href="http://darwinsys.com/file/" target="_blank" rel="nofollow noopener">since the 1970s</a>
</li>
<li>For anyone who doesn't know, it's used to determine what type of file something actually is</li>
<li>This tool doesn't see a lot of development these days, and it's had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&amp;m=141857001403570&amp;w=2" target="_blank" rel="nofollow noopener">remain</a> <a href="https://www.marc.info/?l=freebsd-security&amp;m=142980545021888&amp;w=2" target="_blank" rel="nofollow noopener">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=143014212727213&amp;w=2" target="_blank" rel="nofollow noopener">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=143014276127454&amp;w=2" target="_blank" rel="nofollow noopener">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&amp;m=142989483913635&amp;w=4" target="_blank" rel="nofollow noopener">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" target="_blank" rel="nofollow noopener">christos@netbsd.org</a>
</h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" target="_blank" rel="nofollow noopener">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" target="_blank" rel="nofollow noopener">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD's <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" target="_blank" rel="nofollow noopener">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong>
</li>
<li>OpenBSD's <a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong>
</li>
<li>We'll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" target="_blank" rel="nofollow noopener">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" target="_blank" rel="nofollow noopener">computer-on-module</a>
</li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" target="_blank" rel="nofollow noopener">crochet-freebsd</a>
</li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" target="_blank" rel="nofollow noopener">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" target="_blank" rel="nofollow noopener">had</a> <a href="http://undeadly.org/cgi?action=article&amp;sid=20150427093546" target="_blank" rel="nofollow noopener">some</a> <a href="https://news.ycombinator.com/item?id=9445831" target="_blank" rel="nofollow noopener">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" target="_blank" rel="nofollow noopener">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" target="_blank" rel="nofollow noopener">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" target="_blank" rel="nofollow noopener">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" target="_blank" rel="nofollow noopener">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" target="_blank" rel="nofollow noopener">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li>
<a href="http://slexy.org/view/s25ScxQSwb" target="_blank" rel="nofollow noopener">Charles writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>78: From the Foundation (Part 2)</title>
  <link>https://www.bsdnow.tv/78</link>
  <guid isPermaLink="false">6999608e-fe27-4efa-96b0-eb1e928acf0a</guid>
  <pubDate>Wed, 25 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6999608e-fe27-4efa-96b0-eb1e928acf0a.mp3" length="50146996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2015 schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well&lt;/li&gt;
&lt;li&gt;Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada&lt;/li&gt;
&lt;li&gt;This year's conference will have a massive &lt;strong&gt;fifty&lt;/strong&gt; talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)&lt;/li&gt;
&lt;li&gt;Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  "birds of a feather" gatherings&lt;/li&gt;
&lt;li&gt;In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks&lt;/li&gt;
&lt;li&gt;That's not the &lt;a href="https://twitter.com/bsdcan/status/570394627158773760" target="_blank" rel="nofollow noopener"&gt;ideal balance&lt;/a&gt; we'd hope for, but &lt;a href="https://twitter.com/bsdcan/status/570398181864972288" target="_blank" rel="nofollow noopener"&gt;BSDCan says&lt;/a&gt; they'll try to improve that next year&lt;/li&gt;
&lt;li&gt;Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)&lt;/li&gt;
&lt;li&gt;Michael Lucas (who's on the BSDCan board) wrote up &lt;a href="http://blather.michaelwlucas.com/archives/2325" target="_blank" rel="nofollow noopener"&gt;a blog post&lt;/a&gt; about the proposals and rejections this year&lt;/li&gt;
&lt;li&gt;If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available&lt;/li&gt;
&lt;li&gt;We also &lt;a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" target="_blank" rel="nofollow noopener"&gt;interviewed Dan Langille&lt;/a&gt; about the conference and what to expect this year, so check that out too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" target="_blank" rel="nofollow noopener"&gt;SSL interception with relayd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was a lot of commotion recently about &lt;a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" target="_blank" rel="nofollow noopener"&gt;superfish&lt;/a&gt;, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements&lt;/li&gt;
&lt;li&gt;If you're running &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" target="_blank" rel="nofollow noopener"&gt;relayd&lt;/a&gt;, you can mimic this &lt;em&gt;evil&lt;/em&gt; setup on your own networks (just for testing of course…)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;Reyk Floeter&lt;/a&gt;, the guy who wrote relayd, came up a blog post about how to do &lt;a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" target="_blank" rel="nofollow noopener"&gt;just that&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It starts off with some backstory and some of the things relayd is capable of&lt;/li&gt;
&lt;li&gt;relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL&lt;/li&gt;
&lt;li&gt;When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario&lt;/li&gt;
&lt;li&gt;The post is very long, with lots of &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=135887624714548&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;details&lt;/a&gt; and some sample config files - the whole nine yards
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=77.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.1.6.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense team has released yet another version in rapid succession, but this one has some big changes&lt;/li&gt;
&lt;li&gt;It's now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)&lt;/li&gt;
&lt;li&gt;This version also features a new tool for easily upgrading between versions, simply called "opnsense-update" (similar to freebsd-update)&lt;/li&gt;
&lt;li&gt;It also includes &lt;strong&gt;security&lt;/strong&gt; fixes &lt;a href="https://kb.isc.org/article/AA-01235" target="_blank" rel="nofollow noopener"&gt;for BIND&lt;/a&gt; &lt;a href="http://php.net/ChangeLog-5.php#5.6.6" target="_blank" rel="nofollow noopener"&gt;and PHP&lt;/a&gt;, as well as some other assorted bug fixes&lt;/li&gt;
&lt;li&gt;The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)&lt;/li&gt;
&lt;li&gt;With the news of m0n0wall shutting down last week, they've also released bare minimum hardware specifications required to run OPNsense on embedded devices&lt;/li&gt;
&lt;li&gt;Encouraged by last week's mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental &lt;a href="https://forum.opnsense.org/index.php?topic=78.0" target="_blank" rel="nofollow noopener"&gt;images built against LibreSSL&lt;/a&gt; for testing (and have instructions on how to switch over without reinstalling)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD on a Minnowboard Max&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;What would our show be without at least one story about someone installing BSD on a weird device&lt;/li&gt;
&lt;li&gt;For once, it's actually not NetBSD…&lt;/li&gt;
&lt;li&gt;This article is about the &lt;a href="http://www.minnowboard.org/meet-minnowboard-max/" target="_blank" rel="nofollow noopener"&gt;minnowboard max&lt;/a&gt;, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi&lt;/li&gt;
&lt;li&gt;It's using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)&lt;/li&gt;
&lt;li&gt;The author describes his entirely solid-state setup, noting that there's virtually no noise, no concern about hard drives dying and very reasonable power usage&lt;/li&gt;
&lt;li&gt;You'll find instructions on how to get OpenBSD installed and going throughout the rest of the article&lt;/li&gt;
&lt;li&gt;Have a look at the spec sheet if you're interested, they make for cool little BSD boxes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" target="_blank" rel="nofollow noopener"&gt;Netmap for 40gbit NICs in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he's just committed&lt;/li&gt;
&lt;li&gt;The ixl(4) driver, that's one for the X1710 40-gigabit card, now has netmap support&lt;/li&gt;
&lt;li&gt;It's currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too&lt;/li&gt;
&lt;li&gt;This should make for some serious packet-pushing power&lt;/li&gt;
&lt;li&gt;If you have any network hardware like this, he would appreciate testing for the new code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ken Westerback - &lt;a href="mailto:directors@openbsdfoundation.org" target="_blank" rel="nofollow noopener"&gt;directors@openbsdfoundation.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener"&gt;The OpenBSD foundation&lt;/a&gt;'s activities&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150221222235" target="_blank" rel="nofollow noopener"&gt;s2k15 hackathon report: dhclient/dhcpd/fdisk&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to&lt;/li&gt;
&lt;li&gt;Ken was also busy, getting a few networking-related things fixed and improved in the base system&lt;/li&gt;
&lt;li&gt;He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd&lt;/li&gt;
&lt;li&gt;The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it&lt;/li&gt;
&lt;li&gt;There's apparently plans for "dhclientng" - presumably a big improvement (rewrite?) of dhclient
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/bsdtutorial/videos" target="_blank" rel="nofollow noopener"&gt;FreeBSD beginner video series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD&lt;/li&gt;
&lt;li&gt;We usually assume that people who watch the show are already familiar with basic concepts, but they'd be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand&lt;/li&gt;
&lt;li&gt;So far, he's covered &lt;a href="https://www.youtube.com/watch?v=D26rOHkI-iE" target="_blank" rel="nofollow noopener"&gt;how to get FreeBSD&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=PCyYW19bPDU" target="_blank" rel="nofollow noopener"&gt;an introduction to installing in VirtualBox&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=HCE89kObutA" target="_blank" rel="nofollow noopener"&gt;a simple installation&lt;/a&gt; or a more in-depth &lt;a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" target="_blank" rel="nofollow noopener"&gt;manual installation&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=6YJhdOGjN50" target="_blank" rel="nofollow noopener"&gt;navigating the filesystem&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" target="_blank" rel="nofollow noopener"&gt;basic ssh use&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=ioB73i7QUjI" target="_blank" rel="nofollow noopener"&gt;managing users and groups&lt;/a&gt; and finally some &lt;a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" target="_blank" rel="nofollow noopener"&gt;basic editing&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=16FNtCj-uS4" target="_blank" rel="nofollow noopener"&gt;with vi&lt;/a&gt; and a few other topics&lt;/li&gt;
&lt;li&gt;Everyone's gotta start somewhere and, with a little bit of initial direction, today's newbies could be tomorrow's developers&lt;/li&gt;
&lt;li&gt;It should be an ongoing series with more topics to come
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" target="_blank" rel="nofollow noopener"&gt;NetBSD tests: zero unexpected failures&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD guys have a new blog post up about their &lt;a href="http://wiki.netbsd.org/tutorials/atf/" target="_blank" rel="nofollow noopener"&gt;testing suite&lt;/a&gt; for all the CPU architectures&lt;/li&gt;
&lt;li&gt;They've finally gotten the number of "expected" failures down to zero on a few select architectures&lt;/li&gt;
&lt;li&gt;Results are &lt;a href="http://releng.netbsd.org/test-results.html" target="_blank" rel="nofollow noopener"&gt;published&lt;/a&gt; on a special release engineering page, so you can have a look if you're interested&lt;/li&gt;
&lt;li&gt;The rest of the post links to the "top performers" (ones with less than ten failure) in the -current branch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" target="_blank" rel="nofollow noopener"&gt;PCBSD switches to IPFW&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PCBSD crew continues their recent series of switching between major competing features&lt;/li&gt;
&lt;li&gt;This time, they've switched the default firewall away from PF to FreeBSD's native IPFW firewall&lt;/li&gt;
&lt;li&gt;Look forward to Kris wearing a "keep calm and use IPFW" shir- wait
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21U6Ln6wC" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Kp0xdfIb" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216DcA8DP" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s271iJjqtQ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21zerHI9P" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142454205416445&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;VCS flamebait&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" target="_blank" rel="nofollow noopener"&gt;Hidden agenda&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openbsd foundation, donations, openssh, funding, hackathon, gsoc, core infrastructure initiative, linux foundation, charity, lenovo, superfish, relayd, opnsense, soekris</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"></a><a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year's conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  "birds of a feather" gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That's not the <a href="https://twitter.com/bsdcan/status/570394627158773760" target="_blank" rel="nofollow noopener">ideal balance</a> we'd hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" target="_blank" rel="nofollow noopener">BSDCan says</a> they'll try to improve that next year</li>
<li>Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who's on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" target="_blank" rel="nofollow noopener">a blog post</a> about the proposals and rejections this year</li>
<li>If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" target="_blank" rel="nofollow noopener">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" target="_blank" rel="nofollow noopener">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" target="_blank" rel="nofollow noopener">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you're running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" target="_blank" rel="nofollow noopener">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li>
<a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" target="_blank" rel="nofollow noopener">just that</a>
</li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&amp;m=135887624714548&amp;w=2" target="_blank" rel="nofollow noopener">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" target="_blank" rel="nofollow noopener">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It's now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called "opnsense-update" (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" target="_blank" rel="nofollow noopener">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" target="_blank" rel="nofollow noopener">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they've also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week's mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" target="_blank" rel="nofollow noopener">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" target="_blank" rel="nofollow noopener">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it's actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" target="_blank" rel="nofollow noopener">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It's using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there's virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You'll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you're interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" target="_blank" rel="nofollow noopener">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he's just committed</li>
<li>The ixl(4) driver, that's one for the X1710 40-gigabit card, now has netmap support</li>
<li>It's currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" target="_blank" rel="nofollow noopener">directors@openbsdfoundation.org</a>
</h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener">The OpenBSD foundation</a>'s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20150221222235" target="_blank" rel="nofollow noopener">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There's apparently plans for "dhclientng" - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" target="_blank" rel="nofollow noopener">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they'd be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he's covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" target="_blank" rel="nofollow noopener">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" target="_blank" rel="nofollow noopener">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" target="_blank" rel="nofollow noopener">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" target="_blank" rel="nofollow noopener">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" target="_blank" rel="nofollow noopener">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" target="_blank" rel="nofollow noopener">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" target="_blank" rel="nofollow noopener">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" target="_blank" rel="nofollow noopener">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" target="_blank" rel="nofollow noopener">with vi</a> and a few other topics</li>
<li>Everyone's gotta start somewhere and, with a little bit of initial direction, today's newbies could be tomorrow's developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" target="_blank" rel="nofollow noopener">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" target="_blank" rel="nofollow noopener">testing suite</a> for all the CPU architectures</li>
<li>They've finally gotten the number of "expected" failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" target="_blank" rel="nofollow noopener">published</a> on a special release engineering page, so you can have a look if you're interested</li>
<li>The rest of the post links to the "top performers" (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" target="_blank" rel="nofollow noopener">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they've switched the default firewall away from PF to FreeBSD's native IPFW firewall</li>
<li>Look forward to Kris wearing a "keep calm and use IPFW" shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" target="_blank" rel="nofollow noopener">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" target="_blank" rel="nofollow noopener">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li>
<a href="http://slexy.org/view/s21zerHI9P" target="_blank" rel="nofollow noopener">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&amp;m=142454205416445&amp;w=2" target="_blank" rel="nofollow noopener">VCS flamebait</a></li>
<li>
<a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" target="_blank" rel="nofollow noopener">Hidden agenda</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"></a><a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year's conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  "birds of a feather" gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That's not the <a href="https://twitter.com/bsdcan/status/570394627158773760" target="_blank" rel="nofollow noopener">ideal balance</a> we'd hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" target="_blank" rel="nofollow noopener">BSDCan says</a> they'll try to improve that next year</li>
<li>Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who's on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" target="_blank" rel="nofollow noopener">a blog post</a> about the proposals and rejections this year</li>
<li>If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" target="_blank" rel="nofollow noopener">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" target="_blank" rel="nofollow noopener">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" target="_blank" rel="nofollow noopener">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you're running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" target="_blank" rel="nofollow noopener">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li>
<a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" target="_blank" rel="nofollow noopener">just that</a>
</li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&amp;m=135887624714548&amp;w=2" target="_blank" rel="nofollow noopener">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" target="_blank" rel="nofollow noopener">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It's now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called "opnsense-update" (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" target="_blank" rel="nofollow noopener">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" target="_blank" rel="nofollow noopener">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they've also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week's mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" target="_blank" rel="nofollow noopener">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" target="_blank" rel="nofollow noopener">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it's actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" target="_blank" rel="nofollow noopener">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It's using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there's virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You'll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you're interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" target="_blank" rel="nofollow noopener">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he's just committed</li>
<li>The ixl(4) driver, that's one for the X1710 40-gigabit card, now has netmap support</li>
<li>It's currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" target="_blank" rel="nofollow noopener">directors@openbsdfoundation.org</a>
</h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener">The OpenBSD foundation</a>'s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20150221222235" target="_blank" rel="nofollow noopener">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There's apparently plans for "dhclientng" - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" target="_blank" rel="nofollow noopener">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they'd be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he's covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" target="_blank" rel="nofollow noopener">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" target="_blank" rel="nofollow noopener">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" target="_blank" rel="nofollow noopener">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" target="_blank" rel="nofollow noopener">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" target="_blank" rel="nofollow noopener">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" target="_blank" rel="nofollow noopener">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" target="_blank" rel="nofollow noopener">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" target="_blank" rel="nofollow noopener">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" target="_blank" rel="nofollow noopener">with vi</a> and a few other topics</li>
<li>Everyone's gotta start somewhere and, with a little bit of initial direction, today's newbies could be tomorrow's developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" target="_blank" rel="nofollow noopener">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" target="_blank" rel="nofollow noopener">testing suite</a> for all the CPU architectures</li>
<li>They've finally gotten the number of "expected" failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" target="_blank" rel="nofollow noopener">published</a> on a special release engineering page, so you can have a look if you're interested</li>
<li>The rest of the post links to the "top performers" (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" target="_blank" rel="nofollow noopener">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they've switched the default firewall away from PF to FreeBSD's native IPFW firewall</li>
<li>Look forward to Kris wearing a "keep calm and use IPFW" shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" target="_blank" rel="nofollow noopener">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" target="_blank" rel="nofollow noopener">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" target="_blank" rel="nofollow noopener">Sean writes in</a></li>
<li>
<a href="http://slexy.org/view/s21zerHI9P" target="_blank" rel="nofollow noopener">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&amp;m=142454205416445&amp;w=2" target="_blank" rel="nofollow noopener">VCS flamebait</a></li>
<li>
<a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" target="_blank" rel="nofollow noopener">Hidden agenda</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://opnsense.org/" target="_blank" rel="nofollow noopener"&gt;Introducing OPNsense, a pfSense fork&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OPNsense is a new BSD-based firewall project that was &lt;a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" target="_blank" rel="nofollow noopener"&gt;recently started&lt;/a&gt;, forked from the pfSense codebase&lt;/li&gt;
&lt;li&gt;Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" target="_blank" rel="nofollow noopener"&gt;core team&lt;/a&gt; includes a well-known DragonFlyBSD developer&lt;/li&gt;
&lt;li&gt;You can check out their code &lt;a href="https://github.com/opnsense" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; now, or download an image and try it out - &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;let us know&lt;/a&gt; if you do and what you think about it&lt;/li&gt;
&lt;li&gt;They also have a nice wiki and some &lt;a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" target="_blank" rel="nofollow noopener"&gt;instructions on getting started&lt;/a&gt; for new users&lt;/li&gt;
&lt;li&gt;We plan on having them on the show &lt;strong&gt;next week&lt;/strong&gt; to learn a bit more about how the project got started and why you might want to use it - stay tuned
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Code rot and why I chose OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post about rotting codebases - a core banking system in this example&lt;/li&gt;
&lt;li&gt;The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project&lt;/li&gt;
&lt;li&gt;He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born&lt;/li&gt;
&lt;li&gt;Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it&lt;/li&gt;
&lt;li&gt;The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds&lt;/li&gt;
&lt;li&gt;"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."&lt;/li&gt;
&lt;li&gt;It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"&lt;/li&gt;
&lt;li&gt;Look for the phrase "Getting Started" in the blog post for a nice little gem
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" target="_blank" rel="nofollow noopener"&gt;ZFS vs HAMMER FS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the topics we've seen come up from time to time is how &lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;FreeBSD's ZFS&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener"&gt;DragonFly's HAMMER FS&lt;/a&gt; compare to each other&lt;/li&gt;
&lt;li&gt;They both have a lot of features that traditional filesystems lack&lt;/li&gt;
&lt;li&gt;A forum thread was opened for discussion about them both and what they're typically used for&lt;/li&gt;
&lt;li&gt;It compares resource requirements, ideal hardware and pros/cons of each&lt;/li&gt;
&lt;li&gt;Hopefully someone will do another new comparison when HAMMER 2 is finished&lt;/li&gt;
&lt;li&gt;This is not to be confused with the &lt;a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" target="_blank" rel="nofollow noopener"&gt;other "hammer" filesystem&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" target="_blank" rel="nofollow noopener"&gt;Portable OpenNTPD revived&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With ISC's NTPd having so many security vulnerabilities recently, people need an alternative &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;NTP daemon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD has developed &lt;a href="http://openntpd.org/" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt; since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years&lt;/li&gt;
&lt;li&gt;The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version&lt;/li&gt;
&lt;li&gt;Brent Cook, who we've &lt;a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener"&gt;had on the show before&lt;/a&gt; to talk about LibreSSL, decided it was time to fix this&lt;/li&gt;
&lt;li&gt;While looking through the code, he also found &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" target="_blank" rel="nofollow noopener"&gt;some fixes&lt;/a&gt; for the native version as well&lt;/li&gt;
&lt;li&gt;You can grab it from &lt;a href="https://github.com/openntpd-portable/openntpd-portable" target="_blank" rel="nofollow noopener"&gt;Github&lt;/a&gt; now, or just wait for &lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" target="_blank" rel="nofollow noopener"&gt;the updated release&lt;/a&gt; to hit the repos of your OS of choice
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ian Sutton - &lt;a href="mailto:ian@kremlin.cc" target="_blank" rel="nofollow noopener"&gt;ian@kremlin.cc&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" target="_blank" rel="nofollow noopener"&gt;BSD replacements&lt;/a&gt; for &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856" target="_blank" rel="nofollow noopener"&gt;systemd dependencies&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/freebsd/pkg/pull/1113" target="_blank" rel="nofollow noopener"&gt;pkgng adds OS X support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD's next-gen &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;package manager&lt;/a&gt; has just added support for Mac OS X&lt;/li&gt;
&lt;li&gt;Why would you want that? Well.. we don't really know, but it's cool&lt;/li&gt;
&lt;li&gt;The author of the patch &lt;a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" target="_blank" rel="nofollow noopener"&gt;may have some insight&lt;/a&gt; about what his goal is though&lt;/li&gt;
&lt;li&gt;This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc&lt;/li&gt;
&lt;li&gt;There's also the possibility of pkgng being used as a packaging format for MacPorts in the future&lt;/li&gt;
&lt;li&gt;While we're on the topic of pkgng, you can also watch &lt;a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener"&gt;bapt&lt;/a&gt;'s latest presentation about it from ruBSD 2014 - "&lt;a href="http://is.gd/4AvUwt" target="_blank" rel="nofollow noopener"&gt;four years of pkg&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener"&gt;Secure secure shell&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Almost everyone watching BSD Now probably &lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;uses OpenSSH&lt;/a&gt; and has set up a server at one point or another&lt;/li&gt;
&lt;li&gt;This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear&lt;/li&gt;
&lt;li&gt;It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use&lt;/li&gt;
&lt;li&gt;There are also good explanations for all the choices, based both on history and probability&lt;/li&gt;
&lt;li&gt;Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled&lt;/li&gt;
&lt;li&gt;We've also got &lt;a href="http://ssh-comparison.quendi.de/comparison.html" target="_blank" rel="nofollow noopener"&gt;a handy chart&lt;/a&gt; to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" target="_blank" rel="nofollow noopener"&gt;Dissecting OpenBSD's divert(4)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PF has a cool feature that not a lot of people seem to know about: divert&lt;/li&gt;
&lt;li&gt;It lets you send packets to userspace, allowing you to inspect them a lot easier&lt;/li&gt;
&lt;li&gt;This blog post, the first in a series, details all the cool things you can do with divert and how to use it&lt;/li&gt;
&lt;li&gt;A very common example is with intrusion detection systems like Snort
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" target="_blank" rel="nofollow noopener"&gt;Screen recording on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a neat article about a topic we don't cover very often: making video content on BSD&lt;/li&gt;
&lt;li&gt;In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg&lt;/li&gt;
&lt;li&gt;There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing&lt;/li&gt;
&lt;li&gt;It also includes lots of details and helpful screenshots throughout the process&lt;/li&gt;
&lt;li&gt;You should make cool screencasts and send them to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Zx0ktmb" target="_blank" rel="nofollow noopener"&gt;Camio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vVR5Orhh" target="_blank" rel="nofollow noopener"&gt;ezpzy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Ahb5Lxa" target="_blank" rel="nofollow noopener"&gt;Emett writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20oJmveN6" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2cTayMxPk" target="_blank" rel="nofollow noopener"&gt;Laszlo writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" target="_blank" rel="nofollow noopener"&gt;Protocol X97&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;My thoughts echoed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" target="_blank" rel="nofollow noopener"&gt;Vulnerability sample&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" target="_blank" rel="nofollow noopener">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" target="_blank" rel="nofollow noopener">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" target="_blank" rel="nofollow noopener">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" target="_blank" rel="nofollow noopener">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" target="_blank" rel="nofollow noopener">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" target="_blank" rel="nofollow noopener">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it</li>
<li>The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds</li>
<li>"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."</li>
<li>It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"</li>
<li>Look for the phrase "Getting Started" in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" target="_blank" rel="nofollow noopener">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we've seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener">FreeBSD's ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener">DragonFly's HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they're typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" target="_blank" rel="nofollow noopener">other "hammer" filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" target="_blank" rel="nofollow noopener">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC's NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener">NTP daemon</a>
</li>
<li>OpenBSD has developed <a href="http://openntpd.org/" target="_blank" rel="nofollow noopener">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we've <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" target="_blank" rel="nofollow noopener">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" target="_blank" rel="nofollow noopener">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" target="_blank" rel="nofollow noopener">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" target="_blank" rel="nofollow noopener">ian@kremlin.cc</a>
</h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" target="_blank" rel="nofollow noopener">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&amp;sid=20140915064856" target="_blank" rel="nofollow noopener">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" target="_blank" rel="nofollow noopener">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD's next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don't really know, but it's cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" target="_blank" rel="nofollow noopener">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc</li>
<li>There's also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we're on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener">bapt</a>'s latest presentation about it from ruBSD 2014 - "<a href="http://is.gd/4AvUwt" target="_blank" rel="nofollow noopener">four years of pkg</a>"
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We've also got <a href="http://ssh-comparison.quendi.de/comparison.html" target="_blank" rel="nofollow noopener">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" target="_blank" rel="nofollow noopener">Dissecting OpenBSD's divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" target="_blank" rel="nofollow noopener">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don't cover very often: making video content on BSD</li>
<li>In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" target="_blank" rel="nofollow noopener">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" target="_blank" rel="nofollow noopener">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" target="_blank" rel="nofollow noopener">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" target="_blank" rel="nofollow noopener">Ben writes in</a></li>
<li>
<a href="http://slexy.org/view/s2cTayMxPk" target="_blank" rel="nofollow noopener">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" target="_blank" rel="nofollow noopener">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&amp;m=141159429123859&amp;w=2" target="_blank" rel="nofollow noopener">My thoughts echoed</a></li>
<li>
<a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" target="_blank" rel="nofollow noopener">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" target="_blank" rel="nofollow noopener">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" target="_blank" rel="nofollow noopener">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" target="_blank" rel="nofollow noopener">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" target="_blank" rel="nofollow noopener">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" target="_blank" rel="nofollow noopener">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" target="_blank" rel="nofollow noopener">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it</li>
<li>The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds</li>
<li>"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."</li>
<li>It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"</li>
<li>Look for the phrase "Getting Started" in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" target="_blank" rel="nofollow noopener">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we've seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener">FreeBSD's ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener">DragonFly's HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they're typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" target="_blank" rel="nofollow noopener">other "hammer" filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" target="_blank" rel="nofollow noopener">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC's NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener">NTP daemon</a>
</li>
<li>OpenBSD has developed <a href="http://openntpd.org/" target="_blank" rel="nofollow noopener">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we've <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" target="_blank" rel="nofollow noopener">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" target="_blank" rel="nofollow noopener">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" target="_blank" rel="nofollow noopener">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" target="_blank" rel="nofollow noopener">ian@kremlin.cc</a>
</h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" target="_blank" rel="nofollow noopener">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&amp;sid=20140915064856" target="_blank" rel="nofollow noopener">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" target="_blank" rel="nofollow noopener">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD's next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don't really know, but it's cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" target="_blank" rel="nofollow noopener">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc</li>
<li>There's also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we're on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener">bapt</a>'s latest presentation about it from ruBSD 2014 - "<a href="http://is.gd/4AvUwt" target="_blank" rel="nofollow noopener">four years of pkg</a>"
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We've also got <a href="http://ssh-comparison.quendi.de/comparison.html" target="_blank" rel="nofollow noopener">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" target="_blank" rel="nofollow noopener">Dissecting OpenBSD's divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" target="_blank" rel="nofollow noopener">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don't cover very often: making video content on BSD</li>
<li>In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" target="_blank" rel="nofollow noopener">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" target="_blank" rel="nofollow noopener">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" target="_blank" rel="nofollow noopener">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" target="_blank" rel="nofollow noopener">Ben writes in</a></li>
<li>
<a href="http://slexy.org/view/s2cTayMxPk" target="_blank" rel="nofollow noopener">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" target="_blank" rel="nofollow noopener">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&amp;m=141159429123859&amp;w=2" target="_blank" rel="nofollow noopener">My thoughts echoed</a></li>
<li>
<a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" target="_blank" rel="nofollow noopener">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>27: BSD Now vs. BSDTalk</title>
  <link>https://www.bsdnow.tv/27</link>
  <guid isPermaLink="false">9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7</guid>
  <pubDate>Wed, 05 Mar 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7.mp3" length="73930325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:42:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener"&gt;FreeBSD and OpenBSD in GSOC2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code is a way to encourage students to write code for open source projects and make some money&lt;/li&gt;
&lt;li&gt;Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a list of things that they'd be interested in someone helping out with&lt;/li&gt;
&lt;li&gt;OpenBSD's want list was &lt;a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener"&gt;also posted&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;DragonflyBSD and NetBSD were sadly not accepted this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener"&gt;Yes, you too can be an evil network overlord&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post about monitoring your network using only free tools&lt;/li&gt;
&lt;li&gt;OpenBSD is a great fit, and has all the stuff you need in the base system or via packages&lt;/li&gt;
&lt;li&gt;It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)&lt;/li&gt;
&lt;li&gt;There's also details about flowd and nfsen, more great tools to make network monitoring easy&lt;/li&gt;
&lt;li&gt;If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener"&gt;BSDMag's February issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The theme is "configuring basic services on OpenBSD 5.4"&lt;/li&gt;
&lt;li&gt;There's also an interview with Peter Hansteen (oh hey...)&lt;/li&gt;
&lt;li&gt;Topics also include locking down SSH, a GIMP lesson, user/group management, and...&lt;/li&gt;
&lt;li&gt;Linux and Solaris articles? Why??
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=139320023202696&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Changes in bcrypt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation&lt;/li&gt;
&lt;li&gt;There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)&lt;/li&gt;
&lt;li&gt;"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."&lt;/li&gt;
&lt;li&gt;As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward&lt;/li&gt;
&lt;li&gt;Lots of specifics in the email, check the full thing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Will Backman - &lt;a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener"&gt;bitgeist@yahoo.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener"&gt;@bsdtalk&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The BSDTalk podcast, BSD advocacy, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;Tracking and cross-compiling -CURRENT (NetBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140223112426" target="_blank" rel="nofollow noopener"&gt;X11 no longer needs root&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Xorg has long since required root privileges to run the main server&lt;/li&gt;
&lt;li&gt;With &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;;m=139245772023497&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent work&lt;/a&gt; from the OpenBSD team, now everything (even KMS) can run as a regular user&lt;/li&gt;
&lt;li&gt;Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.6 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shortly after the huge 6.5 release, we get a routine bugfix update&lt;/li&gt;
&lt;li&gt;Test it out on as many systems as you can&lt;/li&gt;
&lt;li&gt;Check the mailing list for the full bug list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140225072408" target="_blank" rel="nofollow noopener"&gt;Creating an OpenBSD USB drive&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it&lt;/li&gt;
&lt;li&gt;Step by step guide on how you can make your very own&lt;/li&gt;
&lt;li&gt;However, there's some &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140228231258" target="_blank" rel="nofollow noopener"&gt;recent emails&lt;/a&gt; that suggest official USB images may be coming soon... &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139377587526463&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;oh wait&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI updates that allow separate ports from /usr/local&lt;/li&gt;
&lt;li&gt;You need to rebuild pbi-manager if you want to try it out&lt;/li&gt;
&lt;li&gt;Updates and changes to Life Preserver, App Cafe, PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener"&gt;espressowar writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, will backman, bsdtalk, podcast, cross compile, build.sh, portable, portability, cross-build, building a release, google summer of code, gsoc, gsoc2014, 2014, spamd, dd, opensmtpd, tcpdump, packet filtering, monitoring, network, bcrypt, solar designer, ixsystems, usb, bootable, jails, openbsd usb drive, ezjail, jails, bsd jail, x11, openssh, pflow, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they'd be interested in someone helping out with</li>
<li>OpenBSD's want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener">also posted</a>
</li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There's also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener">BSDMag's February issue is out</a></h3>

<ul>
<li>The theme is "configuring basic services on OpenBSD 5.4"</li>
<li>There's also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&amp;m=139320023202696&amp;w=2" target="_blank" rel="nofollow noopener">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener">@bsdtalk</a>
</h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20140223112426" target="_blank" rel="nofollow noopener">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&amp;;m=139245772023497&amp;w=2" target="_blank" rel="nofollow noopener">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20140225072408" target="_blank" rel="nofollow noopener">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there's some <a href="http://undeadly.org/cgi?action=article&amp;sid=20140228231258" target="_blank" rel="nofollow noopener">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&amp;m=139377587526463&amp;w=2" target="_blank" rel="nofollow noopener">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener">Adam writes in</a></li>
<li>
<a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener">Alex writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they'd be interested in someone helping out with</li>
<li>OpenBSD's want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener">also posted</a>
</li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There's also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener">BSDMag's February issue is out</a></h3>

<ul>
<li>The theme is "configuring basic services on OpenBSD 5.4"</li>
<li>There's also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&amp;m=139320023202696&amp;w=2" target="_blank" rel="nofollow noopener">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener">@bsdtalk</a>
</h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20140223112426" target="_blank" rel="nofollow noopener">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&amp;;m=139245772023497&amp;w=2" target="_blank" rel="nofollow noopener">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&amp;sid=20140225072408" target="_blank" rel="nofollow noopener">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there's some <a href="http://undeadly.org/cgi?action=article&amp;sid=20140228231258" target="_blank" rel="nofollow noopener">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&amp;m=139377587526463&amp;w=2" target="_blank" rel="nofollow noopener">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener">Adam writes in</a></li>
<li>
<a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener">Alex writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
