<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 05 Mar 2026 21:08:30 -0600</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Hammer”</title>
    <link>https://www.bsdnow.tv/tags/hammer</link>
    <pubDate>Thu, 11 Jul 2019 10:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>306: Comparing Hammers</title>
  <link>https://www.bsdnow.tv/306</link>
  <guid isPermaLink="false">2e907009-f426-4bbd-a592-d91329f11f0f</guid>
  <pubDate>Thu, 11 Jul 2019 10:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2e907009-f426-4bbd-a592-d91329f11f0f.mp3" length="27620333" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</itunes:subtitle>
  <itunes:duration>38:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.
Headlines
Polprog's Am5x86 based retro UNIX build log (https://polprog.net/blog/486/)
I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!
I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It's not that bad, to be honest, and its way easier to access than it would be, if mounted vertically
There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.
Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...
However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM's socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.
Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.
See the article for the rest of the writeup
Setting up services in a FreeNAS Jail (https://www.ixsystems.com/blog/services-in-freenas-jail/)
This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. 
This example shows creating a jail, installing an Apache web server, and setting up a simple web page. 
NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.
News Roundup
First taste of DragonflyBSD (https://nanxiao.me/en/first-taste-of-dragonfly-bsd/)
Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.
I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.
Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.
Streaming Netflix on NetBSD (https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd)
Here's a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.
Heads-up! Sound doesn't work, but everything else is fine. Please read the rest of this thread for a solution to this!!
“Sudo Mastery 2nd Edition” cover art reveal (https://mwl.io/archives/4320)
I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)
But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.
NetBSD on the last G4 Mac mini (https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html)
I'm a big fan of NetBSD. I've run it since 2000 on a Mac IIci (of course it's still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.
Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the "secret" last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they're probably outclassed by later Raspberry Pi models, but I don't have to buy anything and I like putting old hardware to good use.
Hammer vs Hammer2 (https://phoronix.com/scan.php?page=news_item&amp;amp;px=DragonFlyBSD-5.6-HAMMER2-Perf)
With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it's now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. 
With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. 
And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.
Beastie Bits
Unix CLI relational database (https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/)
The TTY demystified (https://www.linusakesson.net/programming/tty/index.php)
Ranger, a console file manager with VI keybindings (https://ranger.github.io/)
Some Unix Humor (https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/)
OpenBSD -import vulkan-loader for Vulkan API support (https://marc.info/?l=openbsd-ports-cvs&amp;amp;m=156121732625604&amp;amp;w=2)
FreeBSD ZFS without drives (https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/)
Feedback/Questions
Moritz - ARM Builds (http://dpaste.com/175RRAZ)
Dave - Videos (http://dpaste.com/2DYK85B)
Chris - Raspberry Pi4 (http://dpaste.com/1B16QVN)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Am5x86, freenas, jail, g4, mac, streaming, netflix, hammer</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://polprog.net/blog/486/" rel="nofollow">Polprog&#39;s Am5x86 based retro UNIX build log</a></h3>

<blockquote>
<p>I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!</p>

<p>I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It&#39;s not that bad, to be honest, and its way easier to access than it would be, if mounted vertically</p>

<p>There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.</p>

<p>Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...</p>

<p>However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM&#39;s socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.</p>

<p>Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/services-in-freenas-jail/" rel="nofollow">Setting up services in a FreeNAS Jail</a></h3>

<blockquote>
<p>This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. </p>

<p>This example shows creating a jail, installing an Apache web server, and setting up a simple web page. </p>

<p>NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nanxiao.me/en/first-taste-of-dragonfly-bsd/" rel="nofollow">First taste of DragonflyBSD</a></h3>

<blockquote>
<p>Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.</p>

<p>I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.</p>

<p>Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.</p>
</blockquote>

<hr>

<h3><a href="https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd" rel="nofollow">Streaming Netflix on NetBSD</a></h3>

<blockquote>
<p>Here&#39;s a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.</p>

<p>Heads-up! Sound doesn&#39;t work, but everything else is fine. Please read the rest of this thread for a solution to this!!</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/4320" rel="nofollow">“Sudo Mastery 2nd Edition” cover art reveal</a></h3>

<blockquote>
<p>I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)</p>

<p>But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.</p>
</blockquote>

<hr>

<h3><a href="https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html" rel="nofollow">NetBSD on the last G4 Mac mini</a></h3>

<blockquote>
<p>I&#39;m a big fan of NetBSD. I&#39;ve run it since 2000 on a Mac IIci (of course it&#39;s still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.</p>

<p>Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the &quot;secret&quot; last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they&#39;re probably outclassed by later Raspberry Pi models, but I don&#39;t have to buy anything and I like putting old hardware to good use.</p>
</blockquote>

<hr>

<h3><a href="https://phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-5.6-HAMMER2-Perf" rel="nofollow">Hammer vs Hammer2</a></h3>

<blockquote>
<p>With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it&#39;s now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. </p>

<p>With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. </p>

<p>And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/" rel="nofollow">Unix CLI relational database</a></li>
<li><a href="https://www.linusakesson.net/programming/tty/index.php" rel="nofollow">The TTY demystified</a></li>
<li><a href="https://ranger.github.io/" rel="nofollow">Ranger, a console file manager with VI keybindings</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/" rel="nofollow">Some Unix Humor</a></li>
<li><a href="https://marc.info/?l=openbsd-ports-cvs&m=156121732625604&w=2" rel="nofollow">OpenBSD -import vulkan-loader for Vulkan API support</a></li>
<li><a href="https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/" rel="nofollow">FreeBSD ZFS without drives</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Moritz - <a href="http://dpaste.com/175RRAZ" rel="nofollow">ARM Builds</a></li>
<li>Dave - <a href="http://dpaste.com/2DYK85B" rel="nofollow">Videos</a></li>
<li>Chris - <a href="http://dpaste.com/1B16QVN" rel="nofollow">Raspberry Pi4</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0306.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Am5x86 based retro UNIX build log, setting up services in a FreeNAS Jail, first taste of DragonflyBSD, streaming Netflix on NetBSD, NetBSD on the last G4 Mac mini, Hammer vs Hammer2, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://polprog.net/blog/486/" rel="nofollow">Polprog&#39;s Am5x86 based retro UNIX build log</a></h3>

<blockquote>
<p>I have recently acquired an Am5x86 computer, in a surprisingly good condition. This is an ongoing project, check this page often for updates!</p>

<p>I began by connecting a front panel. The panel came from a different chassis and is slightly too wide, so I had to attach it with a couple of zip-ties. However, that makes it stick out from the PC front at an angle, allowing easy access when the computer sits at the floor - and thats where it is most of the time. It&#39;s not that bad, to be honest, and its way easier to access than it would be, if mounted vertically</p>

<p>There is a mains switch on the front panel because the computer uses an older style power supply. Those power supplies instead of relying on a PSON signal, like modern ATX supplies, run a 4 wire cable to a mains switch. The cable carries live and neutral both ways, and the switch keys in or out the power. The system powers on as soon as the switch is enabled.</p>

<p>Originally there was no graphics card in it. Since a PC will not boot with out a GPU, I had to find one. The mainboard only has PCI and ISA slots, and all the GPUs I had were AGP. Fortunately, I bought a PCI GPU hoping it would solve my issue...</p>

<p>However the GPU turned out to be faulty. It took me some time to repair it. I had to repair a broken trace leading to one of the EEPROM pins, and replace a contact in the EEPROM&#39;s socket. Then I replaced all the electrolytic capacitors on it, and that fixed it for good.</p>

<p>Having used up only one of the three PCI slots, I populated the remaining pair with two ethernet cards. I still have a bunch of ISA slots available, but I have nothing to install there. Yet.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/services-in-freenas-jail/" rel="nofollow">Setting up services in a FreeNAS Jail</a></h3>

<blockquote>
<p>This piece demonstrates the setup of a server service in a FreeNAS jail and how to share files with a jail using Apache 2.4 as an example. Jails are powerful, self-contained FreeBSD environments with separate network settings, package management, and access to thousands of FreeBSD application packages. Popular packages such as Apache, NGINX, LigHTTPD, MySQL, and PHP can be found and installed with the pkg search and pkg install commands. </p>

<p>This example shows creating a jail, installing an Apache web server, and setting up a simple web page. </p>

<p>NOTE: Do not directly attach FreeNAS to an external network (WAN). Use port forwarding, proper firewalls and DDoS protections when using FreeNAS for external web sites. This example demonstrates expanding the functionality of FreeNAS in an isolated LAN environment.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://nanxiao.me/en/first-taste-of-dragonfly-bsd/" rel="nofollow">First taste of DragonflyBSD</a></h3>

<blockquote>
<p>Last week, I needed to pick a BSD Operating System which supports NUMA to do some testing, so I decided to give Dragonfly BSD a shot. Dragonfly BSDonly can run on X86_64 architecture, which reminds me of Arch Linux, and after some tweaking, I feel Dragonfly BSD may be a “developer-friendly” Operating System, at least for me.</p>

<p>I mainly use Dragonfly BSD as a server, so I don’t care whether GUI is fancy or not. But I have high requirements of developer tools, i.e., compiler and debugger. The default compiler of Dragonfly BSD is gcc 8.3, and I can also install clang 8.0.0 from package. This means I can test state-of-the-art features of compilers, and it is really important for me. gdb‘s version is 7.6.1, a little lag behind, but still OK.</p>

<p>Furthermore, the upgradation of Dragonfly BSD is pretty simple and straightforward. I followed document to upgrade my Operating System to 5.6.0 this morning, just copied and pasted, no single error, booted successfully.</p>
</blockquote>

<hr>

<h3><a href="https://www.unitedbsd.com/d/68-streaming-netflix-on-netbsd" rel="nofollow">Streaming Netflix on NetBSD</a></h3>

<blockquote>
<p>Here&#39;s a step-by-step guide that allows streaming Netflix media on NetBSD using a intel-haxm accelerated QEMU vm.</p>

<p>Heads-up! Sound doesn&#39;t work, but everything else is fine. Please read the rest of this thread for a solution to this!!</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/4320" rel="nofollow">“Sudo Mastery 2nd Edition” cover art reveal</a></h3>

<blockquote>
<p>I’m about halfway through the new edition of Sudo Mastery. Assuming nothing terrible happens, should have a complete first draft in four to six weeks. Enough stuff has changed in sudo that I need to carefully double-check every single feature. (I’m also horrified by the painfully obsolete versions of sudo shipped in the latest versions of CentOS and Debian, but people running those operating systems are already accustomed to their creaky obsolescence.)</p>

<p>But the reason for this blog post? I have Eddie Sharam’s glorious cover art. My Patronizers saw it last month, so now the rest of you get a turn.</p>
</blockquote>

<hr>

<h3><a href="https://tenfourfox.blogspot.com/2019/06/and-now-for-something-completely.html" rel="nofollow">NetBSD on the last G4 Mac mini</a></h3>

<blockquote>
<p>I&#39;m a big fan of NetBSD. I&#39;ve run it since 2000 on a Mac IIci (of course it&#39;s still running it) and I ran it for several years on a Power Mac 7300 with a G3 card which was the second incarnation of the Floodgap gopher server. Today I also still run it on a MIPS-based Cobalt RaQ 2 and an HP Jornada 690. I think NetBSD is a better match for smaller or underpowered systems than current-day Linux, and is fairly easy to harden and keep secure even though none of these systems are exposed to the outside world.</p>

<p>Recently I had a need to set up a bridge system that would be fast enough to connect two networks and I happened to have two of the &quot;secret&quot; last-of-the-line 1.5GHz G4 Mac minis sitting on the shelf doing nothing. Yes, they&#39;re probably outclassed by later Raspberry Pi models, but I don&#39;t have to buy anything and I like putting old hardware to good use.</p>
</blockquote>

<hr>

<h3><a href="https://phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-5.6-HAMMER2-Perf" rel="nofollow">Hammer vs Hammer2</a></h3>

<blockquote>
<p>With the newly released DragonFlyBSD 5.6 there are improvements to its original HAMMER2 file-system to the extent that it&#39;s now selected by its installer as the default file-system choice for new installations. Curious how the performance now compares between HAMMER and HAMMER2, here are some initial benchmarks on an NVMe solid-state drive using DragonFlyBSD 5.6.0. </p>

<p>With a 120GB Toshiba NVMe SSD on an Intel Core i7 8700K system, I ran some benchmarks of DragonFlyBSD 5.6.0 freshly installed with HAMMER2 and then again when returning to the original HAMMER file-system that remains available via its installer. No other changes were made to the setup during testing. </p>

<p>And then for the more synthetic workloads it was just a mix. But overall HAMMER2 was performing well during the initial testing and great to see it continuing to offer noticeable leads in real-world workloads compared to the aging HAMMER file-system. HAMMER2 also offers better clustering, online deduplication, snapshots, compression, encryption, and many other modern file-system features.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://spin.atomicobject.com/2019/06/16/unix-cli-relational-database/" rel="nofollow">Unix CLI relational database</a></li>
<li><a href="https://www.linusakesson.net/programming/tty/index.php" rel="nofollow">The TTY demystified</a></li>
<li><a href="https://ranger.github.io/" rel="nofollow">Ranger, a console file manager with VI keybindings</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/c6o5ze/some_unix_humor/" rel="nofollow">Some Unix Humor</a></li>
<li><a href="https://marc.info/?l=openbsd-ports-cvs&m=156121732625604&w=2" rel="nofollow">OpenBSD -import vulkan-loader for Vulkan API support</a></li>
<li><a href="https://savagedlight.me/2019/06/09/freebsd-zfs-without-drives/" rel="nofollow">FreeBSD ZFS without drives</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Moritz - <a href="http://dpaste.com/175RRAZ" rel="nofollow">ARM Builds</a></li>
<li>Dave - <a href="http://dpaste.com/2DYK85B" rel="nofollow">Videos</a></li>
<li>Chris - <a href="http://dpaste.com/1B16QVN" rel="nofollow">Raspberry Pi4</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0306.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 251: Crypto HAMMER | BSD Now 251</title>
  <link>https://www.bsdnow.tv/251</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2136</guid>
  <pubDate>Thu, 21 Jun 2018 05:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/034d5002-639f-4744-a773-9c000ce91d1c.mp3" length="53300210" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>DragonflyBSD’s hammer1 encrypted master/slave setup, second part of our BSDCan recap, NomadBSD 1.1-RC1 available, OpenBSD adds an LDAP client to base, FreeBSD gets pNFS support, Intel FPU Speculation Vulnerability confirmed, and what some Unix command names mean.</itunes:subtitle>
  <itunes:duration>1:28:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>DragonflyBSD’s hammer1 encrypted master/slave setup, second part of our BSDCan recap, NomadBSD 1.1-RC1 available, OpenBSD adds an LDAP client to base, FreeBSD gets pNFS support, Intel FPU Speculation Vulnerability confirmed, and what some Unix command names mean.
&lt;p&gt;##Headlines&lt;br&gt;
&lt;a href="https://www.reddit.com/r/dragonflybsd/comments/8riwtx/towards_a_hammer1_masterslave_encrypted_setup/"&gt;DragonflyBSD: Towards a HAMMER1 master/slave encrypted setup with LUKS&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I just wanted to share my experience with setting up DragonFly master/slave HAMMER1 PFS’s on top of LUKS&lt;br&gt;
So after a long time using an Synology for my NFS needs, I decided it was time to rethink my setup a little since I had several issues with it :&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;You cannot run NFS on top of encrypted partitions easily&lt;/li&gt;
&lt;li&gt;I suspect I am having some some data corruption (bitrot) on the ext4 filesystem&lt;/li&gt;
&lt;li&gt;the NIC was stcuk to 100 Mbps instead of 1 Gbps even after swapping cables, switches, you name it&lt;/li&gt;
&lt;li&gt;It’s proprietary&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I have been playing with DragonFly in the past and knew about HAMMER, now I just had the perfect excuse to actually use it in production :) After setting up the OS, creating the LUKS partition and HAMMER FS was easy :&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;kdload dm&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cryptsetup luksFormat /dev/serno/&amp;lt;id1&amp;gt;&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cryptsetup luksOpen /dev/serno/&amp;lt;id1&amp;gt; fort_knox&lt;/code&gt;&lt;br&gt;
&lt;code&gt;newfs_hammer -L hammer1_secure_master /dev/mapper/fort_knox&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cryptsetup luksFormat /dev/serno/&amp;lt;id2&amp;gt;&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cryptsetup luksOpen /dev/serno/&amp;lt;id2&amp;gt; fort_knox_slave&lt;/code&gt;&lt;br&gt;
&lt;code&gt;newfs_hammer -L hammer1_secure_slave /dev/mapper/fort_knox_slave&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mount the 2 drives :&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;mount /dev/mapper/fort_knox /fort_knox&lt;/code&gt;&lt;br&gt;
&lt;code&gt;mount /dev/mapper_fort_know_slave /fort_knox_slave&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;You can now put your data under /fort_knox&lt;br&gt;
Now, off to setting up the replication, first get the shared-uuid of /fort_knox&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;hammer pfs-status /fort_knox&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Create a PFS slave “linked” to the master&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;hammer pfs-slave /fort_knox_slave/pfs/slave shared-uuid=f9e7cc0d-eb59-10e3-a5b5-01e6e7cefc12&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;And then stream your data to the slave PFS !&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;hammer mirror-stream /fort_knox /fort_knox_slave/pfs/slave&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;After that, setting NFS is fairly trivial even though I had problem with the /etc/exports syntax which is different than Linux&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;There’s a few things I wish would be better though but nothing too problematic or without workarounds :&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Cannot unlock LUKS partitions at boot time afaik (Acceptable tradeoff for the added security LUKS gives me vs my old Synology setup) but this force me to run a script to unlock LUKS, mount hammer and start mirror-stream at each boot&lt;/li&gt;
&lt;li&gt;No S1/S3 sleep so I made a script to shutdown the system when there’s no network neighborgs to serve the NFS&lt;/li&gt;
&lt;li&gt;As my system isn’t online 24/7 for energy reasons, I guess will have to run hammer cleanup myself from time to time&lt;/li&gt;
&lt;li&gt;Some uncertainty because hey, it’s kind of exotic but exciting too :)&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Overall, I am happy, HAMMER1 and PFS are looking really good, DragonFly is a neat Unix and the community is super friendly (Matthew Dillon actually provided me with a kernel patch to fix the broken ACPI on the PC holding this setup, many thanks!), the system is still a “work in progress” but it is already serving my files as I write this post.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Let’s see in 6 months how it goes in the longer run !&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Helpful resources : &lt;a href="https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/"&gt;https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###BSDCan 2018 Recap&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As promised, here is our second part of our BSDCan report, covering the conference proper. The last tutorials/devsummit of that day lead directly into the conference, as people could pick up their registration packs at the Red Lion and have a drink with fellow BSD folks.&lt;/li&gt;
&lt;li&gt;Allan and I were there only briefly, as we wanted to get back to the “Newcomers orientation and mentorship” session lead by Michael W. Lucas. This session is intended for people that are new to BSDCan (maybe their first BSD conference ever?) and may have questions. Michael explained everything from the 6-2-1 rule (hours of sleep, meals per day, and number of showers that attendees should have at a minimum), to the partner and widowers program (lead by his wife Liz), to the sessions that people should not miss (opening, closing, and hallway track). Old-time BSDCan folks were asked to stand up so that people can recognize them and ask them any questions they might have during the conferences. The session was well attended. Afterwards, people went for dinner in groups, a big one lead by Michael Lucas to his favorite Shawarma place, followed by gelato (of course). This allowed newbies to mingle over dinner and ice cream, creating a welcoming atmosphere.&lt;/li&gt;
&lt;li&gt;The next day, after Dan Langille opened the conference, Benno Rice gave the keynote presentation about “The Tragedy of Systemd”.&lt;/li&gt;
&lt;li&gt;Benedict went to the following talks:&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;“Automating Network Infrastructures with Ansible on FreeBSD” in the DevSummit track. A good talk that connected well with his Ansible tutorial and even allowed some discussions among participants.&lt;br&gt;
“All along the dwatch tower”: Devin delivered a well prepared talk. I first thought that the number of slides would not fit into the time slot, but she even managed to give a demo of her work, which was well received. The dwatch tool she wrote should make it easy for people to get started with DTrace without learning too much about the syntax at first. The visualizations were certainly nice to see, combining different tools together in a new way.&lt;br&gt;
ZFS BoF, lead by Allan and Matthew Ahrens&lt;br&gt;
SSH Key Management by Michael W. Lucas. Yet another great talk where I learned a lot. I did not get to the SSH CA chapter in the new SSH Mastery book, so this was a good way to wet my appetite for it and motivated me to look into creating one for the cluster that I’m managing.&lt;br&gt;
The rest of the day was spent at the FreeBSD Foundation table, talking to various folks. Then, Allan and I had an interview with Kirk McKusick for National FreeBSD Day, then we had a core meeting, followed by a core dinner.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Day 2:
&lt;blockquote&gt;
&lt;p&gt;“Flexible Disk Use in OpenZFS”: Matthew Ahrens talking about the feature he is implementing to expand a RAID-Z with a single disk, as well as device removal.&lt;br&gt;
Allan’s talk about his efforts to implement ZSTD in OpenZFS as another compression algorithm. I liked his overview slides with the numbers comparing the algorithms for their effectiveness and his personal story about the sometimes rocky road to get the feature implemented.&lt;br&gt;
“zrepl - ZFS replication” by Christian Schwarz, was well prepared and even had a demo to show what his snapshot replication tool can do. We covered it on the show before and people can find it under sysutils/zrepl. Feedback and help is welcome.&lt;br&gt;
“The Evolution of FreeBSD Governance” by Kirk McKusick was yet another great talk by him covering the early days of FreeBSD until today, detailing some of the progress and challenges the project faced over the years in terms of leadership and governance. This is an ongoing process that everyone in the community should participate in to keep the project healthy and infused with fresh blood.&lt;br&gt;
Closing session and auction were funny and great as always.&lt;br&gt;
All in all, yet another amazing BSDCan. Thank you Dan Langille and your organizing team for making it happen! Well done.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Digital Ocean&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;###&lt;a href="http://nomadbsd.org/index.html#rel1.1-rc1"&gt;NomadBSD 1.1-RC1 Released&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The first – and hopefully final – release candidate of NomadBSD 1.1 is available!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Changes&lt;/li&gt;
&lt;li&gt;The base system has been upgraded to FreeBSD 11.2-RC3&lt;/li&gt;
&lt;li&gt;EFI booting has been fixed.&lt;/li&gt;
&lt;li&gt;Support for modern Intel GPUs has been added.&lt;/li&gt;
&lt;li&gt;Support for installing packages has been added.&lt;/li&gt;
&lt;li&gt;Improved setup menu.&lt;/li&gt;
&lt;li&gt;More software packages:&lt;/li&gt;
&lt;li&gt;benchmarks/bonnie++&lt;/li&gt;
&lt;li&gt;DSBDisplaySettings&lt;/li&gt;
&lt;li&gt;DSBExec&lt;/li&gt;
&lt;li&gt;DSBSu&lt;/li&gt;
&lt;li&gt;mail/thunderbird&lt;/li&gt;
&lt;li&gt;net/mosh&lt;/li&gt;
&lt;li&gt;ports-mgmt/octopkg&lt;/li&gt;
&lt;li&gt;print/qpdfview&lt;/li&gt;
&lt;li&gt;security/nmap&lt;/li&gt;
&lt;li&gt;sysutils/ddrescue&lt;/li&gt;
&lt;li&gt;sysutils/fusefs-hfsfuse&lt;/li&gt;
&lt;li&gt;sysutils/fusefs-sshfs&lt;/li&gt;
&lt;li&gt;sysutils/sleuthkit&lt;/li&gt;
&lt;li&gt;www/lynx&lt;/li&gt;
&lt;li&gt;x11-wm/compton&lt;/li&gt;
&lt;li&gt;x11/xev&lt;/li&gt;
&lt;li&gt;x11/xterm&lt;/li&gt;
&lt;li&gt;Many improvements and bugfixes&lt;br&gt;
The image and instructions can be found &lt;a href="http://nomadbsd.org/download.html"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;br&gt;
&lt;a href="https://undeadly.org/cgi?action=article;sid=20180616115514"&gt;LDAP client added to -current&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;CVSROOT:    /cvs
Module name:    src
Changes by: reyk@cvs.openbsd.org    2018/06/13 09:45:58

Log message:
    Import ldap(1), a simple ldap search client.
    We have an ldapd(8) server and ypldap in base, so it makes sense to
    have a simple LDAP client without depending on the OpenLDAP package.
    This tool can be used in an ssh(1) AuthorizedKeysCommand script.
    
    With feedback from many including millert@ schwarze@ gilles@ dlg@ jsing@
    
    OK deraadt@
    
    Status:
    
    Vendor Tag: reyk
    Release Tags:   ldap_20180613
    
    N src/usr.bin/ldap/Makefile
    N src/usr.bin/ldap/aldap.c
    N src/usr.bin/ldap/aldap.h
    N src/usr.bin/ldap/ber.c
    N src/usr.bin/ldap/ber.h
    N src/usr.bin/ldap/ldap.1
    N src/usr.bin/ldap/ldapclient.c
    N src/usr.bin/ldap/log.c
    N src/usr.bin/ldap/log.h
    
    No conflicts created by this import
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://undeadly.org/cgi?action=article;sid=20180614064341"&gt;Intel® FPU Speculation Vulnerability Confirmed&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Earlier this month, Philip Guenther (guenther@) &lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=152818076013158&amp;amp;w=2"&gt;committed&lt;/a&gt; (to amd64 -current) a change from lazy to semi-eager FPU switching to mitigate against rumored FPU state leakage in Intel® CPUs.&lt;/li&gt;
&lt;li&gt;Theo de Raadt (deraadt@) discussed this in &lt;a href="https://undeadly.org/cgi?action=article;sid=20180611101817"&gt;his BSDCan 2018 session&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Using information disclosed in Theo’s talk, &lt;a href="https://twitter.com/cperciva/status/1007010583244230656"&gt;Colin Percival&lt;/a&gt; developed a proof-of-concept exploit in around 5 hours. This seems to have prompted an early end to an embargo (in which OpenBSD was not involved), and the &lt;a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"&gt;official announcement&lt;/a&gt; of the vulnerability.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=335072"&gt;FPU change in FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;Summary:
System software may utilize the Lazy FP state restore technique to delay the restoring of state until an instruction operating on that state is actually executed by the new process. Systems using Intel® Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel.
Description:
System software may opt to utilize Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value.
·    CVSS - 4.3 Medium CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Affected Products:
Intel® Core-based microprocessors.
Recommendations:
If an XSAVE-enabled feature is disabled, then we recommend either its state component bitmap in the extended control register (XCR0) is set to 0 (e.g. XCR0[bit 2]=0 for AVX, XCR0[bits 7:5]=0 for AVX512) or the corresponding register states of the feature should be cleared prior to being disabled. Also for relevant states (e.g. x87, SSE, AVX, etc.), Intel recommends system software developers utilize Eager FP state restore in lieu of Lazy FP state restore.
Acknowledgements:
Intel would like to thank Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival for reporting this issue and working with us on coordinated disclosure.
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;&lt;br&gt;
iX Ad Spot&lt;br&gt;
&lt;a href="https://www.ixsystems.com/blog/bsdcan-2018-recap/"&gt;iX Systems - BSDCan 2018 Recap&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;###&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=335012"&gt;FreeBSD gets pNFS support&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Merge the pNFS server code from projects/pnfs-planb-server into head.

This code merge adds a pNFS service to the NFSv4.1 server. Although it is
a large commit it should not affect behaviour for a non-pNFS NFS server.
Some documentation on how this works can be found at:
Merge the pN http://people.freebsd.org/~rmacklem/pnfs-planb-setup.txt
and will hopefully be turned into a proper document soon.
This is a merge of the kernel code. Userland and man page changes will
come soon, once the dust settles on this merge.
It has passed a "make universe", so I hope it will not cause build problems.
It also adds NFSv4.1 server support for the "current stateid".

Here is a brief overview of the pNFS service:
A pNFS service separates the Read/Write operations from all the other NFSv4.1
Metadata operations. It is hoped that this separation allows a pNFS service
to be configured that exceeds the limits of a single NFS server for either
storage capacity and/or I/O bandwidth.
It is possible to configure mirroring within the data servers (DSs) so that
the data storage file for an MDS file will be mirrored on two or more of
the DSs.
When this is used, failure of a DS will not stop the pNFS service and a
failed DS can be recovered once repaired while the pNFS service continues
to operate.  Although two way mirroring would be the norm, it is possible
to set a mirroring level of up to four or the number of DSs, whichever is
less.
The Metadata server will always be a single point of failure,
just as a single NFS server is.

A Plan B pNFS service consists of a single MetaData Server (MDS) and K
Data Servers (DS), all of which are recent FreeBSD systems.
Clients will mount the MDS as they would a single NFS server.
When files are created, the MDS creates a file tree identical to what a
single NFS server creates, except that all the regular (VREG) files will
be empty. As such, if you look at the exported tree on the MDS directly
on the MDS server (not via an NFS mount), the files will all be of size 0.
Each of these files will also have two extended attributes in the system
attribute name space:
pnfsd.dsfile - This extended attrbute stores the information that
    the MDS needs to find the data storage file(s) on DS(s) for this file.
pnfsd.dsattr - This extended attribute stores the Size, AccessTime, ModifyTime
    and Change attributes for the file, so that the MDS doesn't need to
    acquire the attributes from the DS for every Getattr operation.
For each regular (VREG) file, the MDS creates a data storage file on one
(or more if mirroring is enabled) of the DSs in one of the "dsNN"
subdirectories.  The name of this file is the file handle
of the file on the MDS in hexadecimal so that the name is unique.
The DSs use subdirectories named "ds0" to "dsN" so that no one directory
gets too large. The value of "N" is set via the sysctl vfs.nfsd.dsdirsize
on the MDS, with the default being 20.
For production servers that will store a lot of files, this value should
probably be much larger.
It can be increased when the "nfsd" daemon is not running on the MDS,
once the "dsK" directories are created.

For pNFS aware NFSv4.1 clients, the FreeBSD server will return two pieces
of information to the client that allows it to do I/O directly to the DS.
DeviceInfo - This is relatively static information that defines what a DS
             is. The critical bits of information returned by the FreeBSD
             server is the IP address of the DS and, for the Flexible
             File layout, that NFSv4.1 is to be used and that it is
             "tightly coupled".
             There is a "deviceid" which identifies the DeviceInfo.
Layout     - This is per file and can be recalled by the server when it
             is no longer valid. For the FreeBSD server, there is support
             for two types of layout, call File and Flexible File layout.
             Both allow the client to do I/O on the DS via NFSv4.1 I/O
             operations. The Flexible File layout is a more recent variant
             that allows specification of mirrors, where the client is
             expected to do writes to all mirrors to maintain them in a
             consistent state. The Flexible File layout also allows the
             client to report I/O errors for a DS back to the MDS.
             The Flexible File layout supports two variants referred to as
             "tightly coupled" vs "loosely coupled". The FreeBSD server always
             uses the "tightly coupled" variant where the client uses the
             same credentials to do I/O on the DS as it would on the MDS.
             For the "loosely coupled" variant, the layout specifies a
             synthetic user/group that the client uses to do I/O on the DS.
             The FreeBSD server does not do striping and always returns
             layouts for the entire file. The critical information in a layout
             is Read vs Read/Writea and DeviceID(s) that identify which
             DS(s) the data is stored on.

At this time, the MDS generates File Layout layouts to NFSv4.1 clients
that know how to do pNFS for the non-mirrored DS case unless the sysctl
vfs.nfsd.default_flexfile is set non-zero, in which case Flexible File
layouts are generated.
The mirrored DS configuration always generates Flexible File layouts.
For NFS clients that do not support NFSv4.1 pNFS, all I/O operations
are done against the MDS which acts as a proxy for the appropriate DS(s).
When the MDS receives an I/O RPC, it will do the RPC on the DS as a proxy.
If the DS is on the same machine, the MDS/DS will do the RPC on the DS as
a proxy and so on, until the machine runs out of some resource, such as
session slots or mbufs.
As such, DSs must be separate systems from the MDS.

***

###[What does {some strange unix command name} stand for?](http://www.unixguide.net/unix/faq/1.3.shtml)

+ awk = "Aho Weinberger and Kernighan" 
+ grep = "Global Regular Expression Print" 
+ fgrep = "Fixed GREP". 
+ egrep = "Extended GREP" 
+ cat = "CATenate" 
+ gecos = "General Electric Comprehensive Operating Supervisor" 
+ nroff = "New ROFF" 
+ troff = "Typesetter new ROFF" 
+ tee = T 
+ bss = "Block Started by Symbol
+ biff = "BIFF" 
+ rc (as in ".cshrc" or "/etc/rc") = "RunCom" 
+ Don Libes' book "Life with Unix" contains lots more of these 
tidbits. 
***

##Beastie Bits
+ [RetroBSD: Unix for microcontrollers](http://retrobsd.org/wiki/doku.php)
+ [On the matter of OpenBSD breaking embargos (KRACK)](https://marc.info/?l=openbsd-tech&amp;amp;m=152910536208954&amp;amp;w=2)
+ [Theo's Basement Computer Paradise (1998)](https://zeus.theos.com/deraadt/hosts.html)
+ [Airport Extreme runs NetBSD](https://jcs.org/2018/06/12/airport_ssh)
+ [What UNIX shell could have been](https://rain-1.github.io/shell-2.html)

***
Tarsnap ad
***

##Feedback/Questions
+ We need more feedback and questions. Please email feedback@bsdnow.tv 
+ Also, many of you owe us BSDCan trip reports! We have shared what our experience at BSDCan was like, but we want to hear about yours. What can we do better next year? What was it like being there for the first time?
+ [Jason writes in](https://slexy.org/view/s205jU58X2)
    + https://www.wheelsystems.com/en/products/wheel-fudo-psm/
+ [June 19th was National FreeBSD Day](https://twitter.com/search?src=typd&amp;amp;q=%23FreeBSDDay)
***

- Send questions, comments, show ideas/topics, or stories you want mentioned on the show to [feedback@bsdnow.tv](mailto:feedback@bsdnow.tv)
***

&lt;/code&gt;&lt;/pre&gt; 
</description>
  <itunes:keywords>freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview,hammer,Intel,NomadBSD,LDAP,pNFS,RetroBSD</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>DragonflyBSD’s hammer1 encrypted master/slave setup, second part of our BSDCan recap, NomadBSD 1.1-RC1 available, OpenBSD adds an LDAP client to base, FreeBSD gets pNFS support, Intel FPU Speculation Vulnerability confirmed, and what some Unix command names mean.</p>

<p>##Headlines<br>
###<a href="https://www.reddit.com/r/dragonflybsd/comments/8riwtx/towards_a_hammer1_masterslave_encrypted_setup/">DragonflyBSD: Towards a HAMMER1 master/slave encrypted setup with LUKS</a></p>

<blockquote>
<p>I just wanted to share my experience with setting up DragonFly master/slave HAMMER1 PFS’s on top of LUKS<br>
So after a long time using an Synology for my NFS needs, I decided it was time to rethink my setup a little since I had several issues with it :</p>
</blockquote>

<ul>
<li>You cannot run NFS on top of encrypted partitions easily</li>
<li>I suspect I am having some some data corruption (bitrot) on the ext4 filesystem</li>
<li>the NIC was stcuk to 100 Mbps instead of 1 Gbps even after swapping cables, switches, you name it</li>
<li>It’s proprietary</li>
</ul>

<blockquote>
<p>I have been playing with DragonFly in the past and knew about HAMMER, now I just had the perfect excuse to actually use it in production :) After setting up the OS, creating the LUKS partition and HAMMER FS was easy :</p>
</blockquote>

<p><code>kdload dm</code><br>
<code>cryptsetup luksFormat /dev/serno/&lt;id1&gt;</code><br>
<code>cryptsetup luksOpen /dev/serno/&lt;id1&gt; fort_knox</code><br>
<code>newfs_hammer -L hammer1_secure_master /dev/mapper/fort_knox</code><br>
<code>cryptsetup luksFormat /dev/serno/&lt;id2&gt;</code><br>
<code>cryptsetup luksOpen /dev/serno/&lt;id2&gt; fort_knox_slave</code><br>
<code>newfs_hammer -L hammer1_secure_slave /dev/mapper/fort_knox_slave</code></p>

<ul>
<li>Mount the 2 drives :</li>
</ul>

<p><code>mount /dev/mapper/fort_knox /fort_knox</code><br>
<code>mount /dev/mapper_fort_know_slave /fort_knox_slave</code></p>

<blockquote>
<p>You can now put your data under /fort_knox<br>
Now, off to setting up the replication, first get the shared-uuid of /fort_knox</p>
</blockquote>

<p><code>hammer pfs-status /fort_knox</code></p>

<blockquote>
<p>Create a PFS slave “linked” to the master</p>
</blockquote>

<p><code>hammer pfs-slave /fort_knox_slave/pfs/slave shared-uuid=f9e7cc0d-eb59-10e3-a5b5-01e6e7cefc12</code></p>

<blockquote>
<p>And then stream your data to the slave PFS !</p>
</blockquote>

<p><code>hammer mirror-stream /fort_knox /fort_knox_slave/pfs/slave</code></p>

<blockquote>
<p>After that, setting NFS is fairly trivial even though I had problem with the /etc/exports syntax which is different than Linux</p>
</blockquote>

<blockquote>
<p>There’s a few things I wish would be better though but nothing too problematic or without workarounds :</p>
</blockquote>

<ul>
<li>Cannot unlock LUKS partitions at boot time afaik (Acceptable tradeoff for the added security LUKS gives me vs my old Synology setup) but this force me to run a script to unlock LUKS, mount hammer and start mirror-stream at each boot</li>
<li>No S1/S3 sleep so I made a script to shutdown the system when there’s no network neighborgs to serve the NFS</li>
<li>As my system isn’t online 24/7 for energy reasons, I guess will have to run hammer cleanup myself from time to time</li>
<li>Some uncertainty because hey, it’s kind of exotic but exciting too :)</li>
</ul>

<blockquote>
<p>Overall, I am happy, HAMMER1 and PFS are looking really good, DragonFly is a neat Unix and the community is super friendly (Matthew Dillon actually provided me with a kernel patch to fix the broken ACPI on the PC holding this setup, many thanks!), the system is still a “work in progress” but it is already serving my files as I write this post.</p>
</blockquote>

<blockquote>
<p>Let’s see in 6 months how it goes in the longer run !</p>
</blockquote>

<ul>
<li>Helpful resources : <a href="https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/">https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/</a></li>
</ul>

<p><hr></p>

<p>###BSDCan 2018 Recap</p>

<ul>
<li>As promised, here is our second part of our BSDCan report, covering the conference proper. The last tutorials/devsummit of that day lead directly into the conference, as people could pick up their registration packs at the Red Lion and have a drink with fellow BSD folks.</li>
<li>Allan and I were there only briefly, as we wanted to get back to the “Newcomers orientation and mentorship” session lead by Michael W. Lucas. This session is intended for people that are new to BSDCan (maybe their first BSD conference ever?) and may have questions. Michael explained everything from the 6-2-1 rule (hours of sleep, meals per day, and number of showers that attendees should have at a minimum), to the partner and widowers program (lead by his wife Liz), to the sessions that people should not miss (opening, closing, and hallway track). Old-time BSDCan folks were asked to stand up so that people can recognize them and ask them any questions they might have during the conferences. The session was well attended. Afterwards, people went for dinner in groups, a big one lead by Michael Lucas to his favorite Shawarma place, followed by gelato (of course). This allowed newbies to mingle over dinner and ice cream, creating a welcoming atmosphere.</li>
<li>The next day, after Dan Langille opened the conference, Benno Rice gave the keynote presentation about “The Tragedy of Systemd”.</li>
<li>Benedict went to the following talks:</li>
</ul>

<blockquote>
<p>“Automating Network Infrastructures with Ansible on FreeBSD” in the DevSummit track. A good talk that connected well with his Ansible tutorial and even allowed some discussions among participants.<br>
“All along the dwatch tower”: Devin delivered a well prepared talk. I first thought that the number of slides would not fit into the time slot, but she even managed to give a demo of her work, which was well received. The dwatch tool she wrote should make it easy for people to get started with DTrace without learning too much about the syntax at first. The visualizations were certainly nice to see, combining different tools together in a new way.<br>
ZFS BoF, lead by Allan and Matthew Ahrens<br>
SSH Key Management by Michael W. Lucas. Yet another great talk where I learned a lot. I did not get to the SSH CA chapter in the new SSH Mastery book, so this was a good way to wet my appetite for it and motivated me to look into creating one for the cluster that I’m managing.<br>
The rest of the day was spent at the FreeBSD Foundation table, talking to various folks. Then, Allan and I had an interview with Kirk McKusick for National FreeBSD Day, then we had a core meeting, followed by a core dinner.</p>
</blockquote>

<ul>
<li>Day 2:
<blockquote>
<p>“Flexible Disk Use in OpenZFS”: Matthew Ahrens talking about the feature he is implementing to expand a RAID-Z with a single disk, as well as device removal.<br>
Allan’s talk about his efforts to implement ZSTD in OpenZFS as another compression algorithm. I liked his overview slides with the numbers comparing the algorithms for their effectiveness and his personal story about the sometimes rocky road to get the feature implemented.<br>
“zrepl - ZFS replication” by Christian Schwarz, was well prepared and even had a demo to show what his snapshot replication tool can do. We covered it on the show before and people can find it under sysutils/zrepl. Feedback and help is welcome.<br>
“The Evolution of FreeBSD Governance” by Kirk McKusick was yet another great talk by him covering the early days of FreeBSD until today, detailing some of the progress and challenges the project faced over the years in terms of leadership and governance. This is an ongoing process that everyone in the community should participate in to keep the project healthy and infused with fresh blood.<br>
Closing session and auction were funny and great as always.<br>
All in all, yet another amazing BSDCan. Thank you Dan Langille and your organizing team for making it happen! Well done.</p>
</blockquote>
</li>
</ul>

<p><hr></p>

<p><strong>Digital Ocean</strong></p>

<p>###<a href="http://nomadbsd.org/index.html#rel1.1-rc1">NomadBSD 1.1-RC1 Released</a></p>

<blockquote>
<p>The first – and hopefully final – release candidate of NomadBSD 1.1 is available!</p>
</blockquote>

<ul>
<li>Changes</li>
<li>The base system has been upgraded to FreeBSD 11.2-RC3</li>
<li>EFI booting has been fixed.</li>
<li>Support for modern Intel GPUs has been added.</li>
<li>Support for installing packages has been added.</li>
<li>Improved setup menu.</li>
<li>More software packages:</li>
<li>benchmarks/bonnie++</li>
<li>DSBDisplaySettings</li>
<li>DSBExec</li>
<li>DSBSu</li>
<li>mail/thunderbird</li>
<li>net/mosh</li>
<li>ports-mgmt/octopkg</li>
<li>print/qpdfview</li>
<li>security/nmap</li>
<li>sysutils/ddrescue</li>
<li>sysutils/fusefs-hfsfuse</li>
<li>sysutils/fusefs-sshfs</li>
<li>sysutils/sleuthkit</li>
<li>www/lynx</li>
<li>x11-wm/compton</li>
<li>x11/xev</li>
<li>x11/xterm</li>
<li>Many improvements and bugfixes<br>
The image and instructions can be found <a href="http://nomadbsd.org/download.html">here</a>.</li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://undeadly.org/cgi?action=article;sid=20180616115514">LDAP client added to -current</a></p>

<pre><code>CVSROOT:    /cvs
Module name:    src
Changes by: reyk@cvs.openbsd.org    2018/06/13 09:45:58

Log message:
    Import ldap(1), a simple ldap search client.
    We have an ldapd(8) server and ypldap in base, so it makes sense to
    have a simple LDAP client without depending on the OpenLDAP package.
    This tool can be used in an ssh(1) AuthorizedKeysCommand script.
    
    With feedback from many including millert@ schwarze@ gilles@ dlg@ jsing@
    
    OK deraadt@
    
    Status:
    
    Vendor Tag: reyk
    Release Tags:   ldap_20180613
    
    N src/usr.bin/ldap/Makefile
    N src/usr.bin/ldap/aldap.c
    N src/usr.bin/ldap/aldap.h
    N src/usr.bin/ldap/ber.c
    N src/usr.bin/ldap/ber.h
    N src/usr.bin/ldap/ldap.1
    N src/usr.bin/ldap/ldapclient.c
    N src/usr.bin/ldap/log.c
    N src/usr.bin/ldap/log.h
    
    No conflicts created by this import
</code></pre>

<p><hr></p>

<p>###<a href="https://undeadly.org/cgi?action=article;sid=20180614064341">Intel® FPU Speculation Vulnerability Confirmed</a></p>

<ul>
<li>Earlier this month, Philip Guenther (guenther@) <a href="https://marc.info/?l=openbsd-cvs&amp;m=152818076013158&amp;w=2">committed</a> (to amd64 -current) a change from lazy to semi-eager FPU switching to mitigate against rumored FPU state leakage in Intel® CPUs.</li>
<li>Theo de Raadt (deraadt@) discussed this in <a href="https://undeadly.org/cgi?action=article;sid=20180611101817">his BSDCan 2018 session</a>.</li>
<li>Using information disclosed in Theo’s talk, <a href="https://twitter.com/cperciva/status/1007010583244230656">Colin Percival</a> developed a proof-of-concept exploit in around 5 hours. This seems to have prompted an early end to an embargo (in which OpenBSD was not involved), and the <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html">official announcement</a> of the vulnerability.</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=335072">FPU change in FreeBSD</a></li>
</ul>

<pre><code>Summary:

System software may utilize the Lazy FP state restore technique to delay the restoring of state until an instruction operating on that state is actually executed by the new process. Systems using Intel® Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel.

Description:

System software may opt to utilize Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value.

    ·    CVSS - 4.3 Medium CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Affected Products:

Intel® Core-based microprocessors.

Recommendations:

If an XSAVE-enabled feature is disabled, then we recommend either its state component bitmap in the extended control register (XCR0) is set to 0 (e.g. XCR0[bit 2]=0 for AVX, XCR0[bits 7:5]=0 for AVX512) or the corresponding register states of the feature should be cleared prior to being disabled. Also for relevant states (e.g. x87, SSE, AVX, etc.), Intel recommends system software developers utilize Eager FP state restore in lieu of Lazy FP state restore.

Acknowledgements:

Intel would like to thank Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival for reporting this issue and working with us on coordinated disclosure.
</code></pre>

<p><hr></p>

<p><strong>iXsystems</strong><br>
iX Ad Spot<br>
###<a href="https://www.ixsystems.com/blog/bsdcan-2018-recap/">iX Systems - BSDCan 2018 Recap</a></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=335012">FreeBSD gets pNFS support</a></p>

<pre><code>Merge the pNFS server code from projects/pnfs-planb-server into head.

This code merge adds a pNFS service to the NFSv4.1 server. Although it is
a large commit it should not affect behaviour for a non-pNFS NFS server.
Some documentation on how this works can be found at:
Merge the pN http://people.freebsd.org/~rmacklem/pnfs-planb-setup.txt
and will hopefully be turned into a proper document soon.
This is a merge of the kernel code. Userland and man page changes will
come soon, once the dust settles on this merge.
It has passed a &quot;make universe&quot;, so I hope it will not cause build problems.
It also adds NFSv4.1 server support for the &quot;current stateid&quot;.

Here is a brief overview of the pNFS service:
A pNFS service separates the Read/Write operations from all the other NFSv4.1
Metadata operations. It is hoped that this separation allows a pNFS service
to be configured that exceeds the limits of a single NFS server for either
storage capacity and/or I/O bandwidth.
It is possible to configure mirroring within the data servers (DSs) so that
the data storage file for an MDS file will be mirrored on two or more of
the DSs.
When this is used, failure of a DS will not stop the pNFS service and a
failed DS can be recovered once repaired while the pNFS service continues
to operate.  Although two way mirroring would be the norm, it is possible
to set a mirroring level of up to four or the number of DSs, whichever is
less.
The Metadata server will always be a single point of failure,
just as a single NFS server is.

A Plan B pNFS service consists of a single MetaData Server (MDS) and K
Data Servers (DS), all of which are recent FreeBSD systems.
Clients will mount the MDS as they would a single NFS server.
When files are created, the MDS creates a file tree identical to what a
single NFS server creates, except that all the regular (VREG) files will
be empty. As such, if you look at the exported tree on the MDS directly
on the MDS server (not via an NFS mount), the files will all be of size 0.
Each of these files will also have two extended attributes in the system
attribute name space:
pnfsd.dsfile - This extended attrbute stores the information that
    the MDS needs to find the data storage file(s) on DS(s) for this file.
pnfsd.dsattr - This extended attribute stores the Size, AccessTime, ModifyTime
    and Change attributes for the file, so that the MDS doesn't need to
    acquire the attributes from the DS for every Getattr operation.
For each regular (VREG) file, the MDS creates a data storage file on one
(or more if mirroring is enabled) of the DSs in one of the &quot;dsNN&quot;
subdirectories.  The name of this file is the file handle
of the file on the MDS in hexadecimal so that the name is unique.
The DSs use subdirectories named &quot;ds0&quot; to &quot;dsN&quot; so that no one directory
gets too large. The value of &quot;N&quot; is set via the sysctl vfs.nfsd.dsdirsize
on the MDS, with the default being 20.
For production servers that will store a lot of files, this value should
probably be much larger.
It can be increased when the &quot;nfsd&quot; daemon is not running on the MDS,
once the &quot;dsK&quot; directories are created.

For pNFS aware NFSv4.1 clients, the FreeBSD server will return two pieces
of information to the client that allows it to do I/O directly to the DS.
DeviceInfo - This is relatively static information that defines what a DS
             is. The critical bits of information returned by the FreeBSD
             server is the IP address of the DS and, for the Flexible
             File layout, that NFSv4.1 is to be used and that it is
             &quot;tightly coupled&quot;.
             There is a &quot;deviceid&quot; which identifies the DeviceInfo.
Layout     - This is per file and can be recalled by the server when it
             is no longer valid. For the FreeBSD server, there is support
             for two types of layout, call File and Flexible File layout.
             Both allow the client to do I/O on the DS via NFSv4.1 I/O
             operations. The Flexible File layout is a more recent variant
             that allows specification of mirrors, where the client is
             expected to do writes to all mirrors to maintain them in a
             consistent state. The Flexible File layout also allows the
             client to report I/O errors for a DS back to the MDS.
             The Flexible File layout supports two variants referred to as
             &quot;tightly coupled&quot; vs &quot;loosely coupled&quot;. The FreeBSD server always
             uses the &quot;tightly coupled&quot; variant where the client uses the
             same credentials to do I/O on the DS as it would on the MDS.
             For the &quot;loosely coupled&quot; variant, the layout specifies a
             synthetic user/group that the client uses to do I/O on the DS.
             The FreeBSD server does not do striping and always returns
             layouts for the entire file. The critical information in a layout
             is Read vs Read/Writea and DeviceID(s) that identify which
             DS(s) the data is stored on.

At this time, the MDS generates File Layout layouts to NFSv4.1 clients
that know how to do pNFS for the non-mirrored DS case unless the sysctl
vfs.nfsd.default_flexfile is set non-zero, in which case Flexible File
layouts are generated.
The mirrored DS configuration always generates Flexible File layouts.
For NFS clients that do not support NFSv4.1 pNFS, all I/O operations
are done against the MDS which acts as a proxy for the appropriate DS(s).
When the MDS receives an I/O RPC, it will do the RPC on the DS as a proxy.
If the DS is on the same machine, the MDS/DS will do the RPC on the DS as
a proxy and so on, until the machine runs out of some resource, such as
session slots or mbufs.
As such, DSs must be separate systems from the MDS.

***

###[What does {some strange unix command name} stand for?](http://www.unixguide.net/unix/faq/1.3.shtml)

+ awk = &quot;Aho Weinberger and Kernighan&quot; 
+ grep = &quot;Global Regular Expression Print&quot; 
+ fgrep = &quot;Fixed GREP&quot;. 
+ egrep = &quot;Extended GREP&quot; 
+ cat = &quot;CATenate&quot; 
+ gecos = &quot;General Electric Comprehensive Operating Supervisor&quot; 
+ nroff = &quot;New ROFF&quot; 
+ troff = &quot;Typesetter new ROFF&quot; 
+ tee = T 
+ bss = &quot;Block Started by Symbol
+ biff = &quot;BIFF&quot; 
+ rc (as in &quot;.cshrc&quot; or &quot;/etc/rc&quot;) = &quot;RunCom&quot; 
+ Don Libes' book &quot;Life with Unix&quot; contains lots more of these 
tidbits. 
***

##Beastie Bits
+ [RetroBSD: Unix for microcontrollers](http://retrobsd.org/wiki/doku.php)
+ [On the matter of OpenBSD breaking embargos (KRACK)](https://marc.info/?l=openbsd-tech&amp;m=152910536208954&amp;w=2)
+ [Theo's Basement Computer Paradise (1998)](https://zeus.theos.com/deraadt/hosts.html)
+ [Airport Extreme runs NetBSD](https://jcs.org/2018/06/12/airport_ssh)
+ [What UNIX shell could have been](https://rain-1.github.io/shell-2.html)

***
Tarsnap ad
***

##Feedback/Questions
+ We need more feedback and questions. Please email feedback@bsdnow.tv 
+ Also, many of you owe us BSDCan trip reports! We have shared what our experience at BSDCan was like, but we want to hear about yours. What can we do better next year? What was it like being there for the first time?
+ [Jason writes in](https://slexy.org/view/s205jU58X2)
    + https://www.wheelsystems.com/en/products/wheel-fudo-psm/
+ [June 19th was National FreeBSD Day](https://twitter.com/search?src=typd&amp;q=%23FreeBSDDay)
***

- Send questions, comments, show ideas/topics, or stories you want mentioned on the show to [feedback@bsdnow.tv](mailto:feedback@bsdnow.tv)
***

</code></pre>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>DragonflyBSD’s hammer1 encrypted master/slave setup, second part of our BSDCan recap, NomadBSD 1.1-RC1 available, OpenBSD adds an LDAP client to base, FreeBSD gets pNFS support, Intel FPU Speculation Vulnerability confirmed, and what some Unix command names mean.</p>

<p>##Headlines<br>
###<a href="https://www.reddit.com/r/dragonflybsd/comments/8riwtx/towards_a_hammer1_masterslave_encrypted_setup/">DragonflyBSD: Towards a HAMMER1 master/slave encrypted setup with LUKS</a></p>

<blockquote>
<p>I just wanted to share my experience with setting up DragonFly master/slave HAMMER1 PFS’s on top of LUKS<br>
So after a long time using an Synology for my NFS needs, I decided it was time to rethink my setup a little since I had several issues with it :</p>
</blockquote>

<ul>
<li>You cannot run NFS on top of encrypted partitions easily</li>
<li>I suspect I am having some some data corruption (bitrot) on the ext4 filesystem</li>
<li>the NIC was stcuk to 100 Mbps instead of 1 Gbps even after swapping cables, switches, you name it</li>
<li>It’s proprietary</li>
</ul>

<blockquote>
<p>I have been playing with DragonFly in the past and knew about HAMMER, now I just had the perfect excuse to actually use it in production :) After setting up the OS, creating the LUKS partition and HAMMER FS was easy :</p>
</blockquote>

<p><code>kdload dm</code><br>
<code>cryptsetup luksFormat /dev/serno/&lt;id1&gt;</code><br>
<code>cryptsetup luksOpen /dev/serno/&lt;id1&gt; fort_knox</code><br>
<code>newfs_hammer -L hammer1_secure_master /dev/mapper/fort_knox</code><br>
<code>cryptsetup luksFormat /dev/serno/&lt;id2&gt;</code><br>
<code>cryptsetup luksOpen /dev/serno/&lt;id2&gt; fort_knox_slave</code><br>
<code>newfs_hammer -L hammer1_secure_slave /dev/mapper/fort_knox_slave</code></p>

<ul>
<li>Mount the 2 drives :</li>
</ul>

<p><code>mount /dev/mapper/fort_knox /fort_knox</code><br>
<code>mount /dev/mapper_fort_know_slave /fort_knox_slave</code></p>

<blockquote>
<p>You can now put your data under /fort_knox<br>
Now, off to setting up the replication, first get the shared-uuid of /fort_knox</p>
</blockquote>

<p><code>hammer pfs-status /fort_knox</code></p>

<blockquote>
<p>Create a PFS slave “linked” to the master</p>
</blockquote>

<p><code>hammer pfs-slave /fort_knox_slave/pfs/slave shared-uuid=f9e7cc0d-eb59-10e3-a5b5-01e6e7cefc12</code></p>

<blockquote>
<p>And then stream your data to the slave PFS !</p>
</blockquote>

<p><code>hammer mirror-stream /fort_knox /fort_knox_slave/pfs/slave</code></p>

<blockquote>
<p>After that, setting NFS is fairly trivial even though I had problem with the /etc/exports syntax which is different than Linux</p>
</blockquote>

<blockquote>
<p>There’s a few things I wish would be better though but nothing too problematic or without workarounds :</p>
</blockquote>

<ul>
<li>Cannot unlock LUKS partitions at boot time afaik (Acceptable tradeoff for the added security LUKS gives me vs my old Synology setup) but this force me to run a script to unlock LUKS, mount hammer and start mirror-stream at each boot</li>
<li>No S1/S3 sleep so I made a script to shutdown the system when there’s no network neighborgs to serve the NFS</li>
<li>As my system isn’t online 24/7 for energy reasons, I guess will have to run hammer cleanup myself from time to time</li>
<li>Some uncertainty because hey, it’s kind of exotic but exciting too :)</li>
</ul>

<blockquote>
<p>Overall, I am happy, HAMMER1 and PFS are looking really good, DragonFly is a neat Unix and the community is super friendly (Matthew Dillon actually provided me with a kernel patch to fix the broken ACPI on the PC holding this setup, many thanks!), the system is still a “work in progress” but it is already serving my files as I write this post.</p>
</blockquote>

<blockquote>
<p>Let’s see in 6 months how it goes in the longer run !</p>
</blockquote>

<ul>
<li>Helpful resources : <a href="https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/">https://www.dragonflybsd.org/docs/how_to_implement_hammer_pseudo_file_system__40___pfs___41___slave_mirroring_from_pfs_master/</a></li>
</ul>

<p><hr></p>

<p>###BSDCan 2018 Recap</p>

<ul>
<li>As promised, here is our second part of our BSDCan report, covering the conference proper. The last tutorials/devsummit of that day lead directly into the conference, as people could pick up their registration packs at the Red Lion and have a drink with fellow BSD folks.</li>
<li>Allan and I were there only briefly, as we wanted to get back to the “Newcomers orientation and mentorship” session lead by Michael W. Lucas. This session is intended for people that are new to BSDCan (maybe their first BSD conference ever?) and may have questions. Michael explained everything from the 6-2-1 rule (hours of sleep, meals per day, and number of showers that attendees should have at a minimum), to the partner and widowers program (lead by his wife Liz), to the sessions that people should not miss (opening, closing, and hallway track). Old-time BSDCan folks were asked to stand up so that people can recognize them and ask them any questions they might have during the conferences. The session was well attended. Afterwards, people went for dinner in groups, a big one lead by Michael Lucas to his favorite Shawarma place, followed by gelato (of course). This allowed newbies to mingle over dinner and ice cream, creating a welcoming atmosphere.</li>
<li>The next day, after Dan Langille opened the conference, Benno Rice gave the keynote presentation about “The Tragedy of Systemd”.</li>
<li>Benedict went to the following talks:</li>
</ul>

<blockquote>
<p>“Automating Network Infrastructures with Ansible on FreeBSD” in the DevSummit track. A good talk that connected well with his Ansible tutorial and even allowed some discussions among participants.<br>
“All along the dwatch tower”: Devin delivered a well prepared talk. I first thought that the number of slides would not fit into the time slot, but she even managed to give a demo of her work, which was well received. The dwatch tool she wrote should make it easy for people to get started with DTrace without learning too much about the syntax at first. The visualizations were certainly nice to see, combining different tools together in a new way.<br>
ZFS BoF, lead by Allan and Matthew Ahrens<br>
SSH Key Management by Michael W. Lucas. Yet another great talk where I learned a lot. I did not get to the SSH CA chapter in the new SSH Mastery book, so this was a good way to wet my appetite for it and motivated me to look into creating one for the cluster that I’m managing.<br>
The rest of the day was spent at the FreeBSD Foundation table, talking to various folks. Then, Allan and I had an interview with Kirk McKusick for National FreeBSD Day, then we had a core meeting, followed by a core dinner.</p>
</blockquote>

<ul>
<li>Day 2:
<blockquote>
<p>“Flexible Disk Use in OpenZFS”: Matthew Ahrens talking about the feature he is implementing to expand a RAID-Z with a single disk, as well as device removal.<br>
Allan’s talk about his efforts to implement ZSTD in OpenZFS as another compression algorithm. I liked his overview slides with the numbers comparing the algorithms for their effectiveness and his personal story about the sometimes rocky road to get the feature implemented.<br>
“zrepl - ZFS replication” by Christian Schwarz, was well prepared and even had a demo to show what his snapshot replication tool can do. We covered it on the show before and people can find it under sysutils/zrepl. Feedback and help is welcome.<br>
“The Evolution of FreeBSD Governance” by Kirk McKusick was yet another great talk by him covering the early days of FreeBSD until today, detailing some of the progress and challenges the project faced over the years in terms of leadership and governance. This is an ongoing process that everyone in the community should participate in to keep the project healthy and infused with fresh blood.<br>
Closing session and auction were funny and great as always.<br>
All in all, yet another amazing BSDCan. Thank you Dan Langille and your organizing team for making it happen! Well done.</p>
</blockquote>
</li>
</ul>

<p><hr></p>

<p><strong>Digital Ocean</strong></p>

<p>###<a href="http://nomadbsd.org/index.html#rel1.1-rc1">NomadBSD 1.1-RC1 Released</a></p>

<blockquote>
<p>The first – and hopefully final – release candidate of NomadBSD 1.1 is available!</p>
</blockquote>

<ul>
<li>Changes</li>
<li>The base system has been upgraded to FreeBSD 11.2-RC3</li>
<li>EFI booting has been fixed.</li>
<li>Support for modern Intel GPUs has been added.</li>
<li>Support for installing packages has been added.</li>
<li>Improved setup menu.</li>
<li>More software packages:</li>
<li>benchmarks/bonnie++</li>
<li>DSBDisplaySettings</li>
<li>DSBExec</li>
<li>DSBSu</li>
<li>mail/thunderbird</li>
<li>net/mosh</li>
<li>ports-mgmt/octopkg</li>
<li>print/qpdfview</li>
<li>security/nmap</li>
<li>sysutils/ddrescue</li>
<li>sysutils/fusefs-hfsfuse</li>
<li>sysutils/fusefs-sshfs</li>
<li>sysutils/sleuthkit</li>
<li>www/lynx</li>
<li>x11-wm/compton</li>
<li>x11/xev</li>
<li>x11/xterm</li>
<li>Many improvements and bugfixes<br>
The image and instructions can be found <a href="http://nomadbsd.org/download.html">here</a>.</li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://undeadly.org/cgi?action=article;sid=20180616115514">LDAP client added to -current</a></p>

<pre><code>CVSROOT:    /cvs
Module name:    src
Changes by: reyk@cvs.openbsd.org    2018/06/13 09:45:58

Log message:
    Import ldap(1), a simple ldap search client.
    We have an ldapd(8) server and ypldap in base, so it makes sense to
    have a simple LDAP client without depending on the OpenLDAP package.
    This tool can be used in an ssh(1) AuthorizedKeysCommand script.
    
    With feedback from many including millert@ schwarze@ gilles@ dlg@ jsing@
    
    OK deraadt@
    
    Status:
    
    Vendor Tag: reyk
    Release Tags:   ldap_20180613
    
    N src/usr.bin/ldap/Makefile
    N src/usr.bin/ldap/aldap.c
    N src/usr.bin/ldap/aldap.h
    N src/usr.bin/ldap/ber.c
    N src/usr.bin/ldap/ber.h
    N src/usr.bin/ldap/ldap.1
    N src/usr.bin/ldap/ldapclient.c
    N src/usr.bin/ldap/log.c
    N src/usr.bin/ldap/log.h
    
    No conflicts created by this import
</code></pre>

<p><hr></p>

<p>###<a href="https://undeadly.org/cgi?action=article;sid=20180614064341">Intel® FPU Speculation Vulnerability Confirmed</a></p>

<ul>
<li>Earlier this month, Philip Guenther (guenther@) <a href="https://marc.info/?l=openbsd-cvs&amp;m=152818076013158&amp;w=2">committed</a> (to amd64 -current) a change from lazy to semi-eager FPU switching to mitigate against rumored FPU state leakage in Intel® CPUs.</li>
<li>Theo de Raadt (deraadt@) discussed this in <a href="https://undeadly.org/cgi?action=article;sid=20180611101817">his BSDCan 2018 session</a>.</li>
<li>Using information disclosed in Theo’s talk, <a href="https://twitter.com/cperciva/status/1007010583244230656">Colin Percival</a> developed a proof-of-concept exploit in around 5 hours. This seems to have prompted an early end to an embargo (in which OpenBSD was not involved), and the <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html">official announcement</a> of the vulnerability.</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=335072">FPU change in FreeBSD</a></li>
</ul>

<pre><code>Summary:

System software may utilize the Lazy FP state restore technique to delay the restoring of state until an instruction operating on that state is actually executed by the new process. Systems using Intel® Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel.

Description:

System software may opt to utilize Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value.

    ·    CVSS - 4.3 Medium CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Affected Products:

Intel® Core-based microprocessors.

Recommendations:

If an XSAVE-enabled feature is disabled, then we recommend either its state component bitmap in the extended control register (XCR0) is set to 0 (e.g. XCR0[bit 2]=0 for AVX, XCR0[bits 7:5]=0 for AVX512) or the corresponding register states of the feature should be cleared prior to being disabled. Also for relevant states (e.g. x87, SSE, AVX, etc.), Intel recommends system software developers utilize Eager FP state restore in lieu of Lazy FP state restore.

Acknowledgements:

Intel would like to thank Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival for reporting this issue and working with us on coordinated disclosure.
</code></pre>

<p><hr></p>

<p><strong>iXsystems</strong><br>
iX Ad Spot<br>
###<a href="https://www.ixsystems.com/blog/bsdcan-2018-recap/">iX Systems - BSDCan 2018 Recap</a></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=335012">FreeBSD gets pNFS support</a></p>

<pre><code>Merge the pNFS server code from projects/pnfs-planb-server into head.

This code merge adds a pNFS service to the NFSv4.1 server. Although it is
a large commit it should not affect behaviour for a non-pNFS NFS server.
Some documentation on how this works can be found at:
Merge the pN http://people.freebsd.org/~rmacklem/pnfs-planb-setup.txt
and will hopefully be turned into a proper document soon.
This is a merge of the kernel code. Userland and man page changes will
come soon, once the dust settles on this merge.
It has passed a &quot;make universe&quot;, so I hope it will not cause build problems.
It also adds NFSv4.1 server support for the &quot;current stateid&quot;.

Here is a brief overview of the pNFS service:
A pNFS service separates the Read/Write operations from all the other NFSv4.1
Metadata operations. It is hoped that this separation allows a pNFS service
to be configured that exceeds the limits of a single NFS server for either
storage capacity and/or I/O bandwidth.
It is possible to configure mirroring within the data servers (DSs) so that
the data storage file for an MDS file will be mirrored on two or more of
the DSs.
When this is used, failure of a DS will not stop the pNFS service and a
failed DS can be recovered once repaired while the pNFS service continues
to operate.  Although two way mirroring would be the norm, it is possible
to set a mirroring level of up to four or the number of DSs, whichever is
less.
The Metadata server will always be a single point of failure,
just as a single NFS server is.

A Plan B pNFS service consists of a single MetaData Server (MDS) and K
Data Servers (DS), all of which are recent FreeBSD systems.
Clients will mount the MDS as they would a single NFS server.
When files are created, the MDS creates a file tree identical to what a
single NFS server creates, except that all the regular (VREG) files will
be empty. As such, if you look at the exported tree on the MDS directly
on the MDS server (not via an NFS mount), the files will all be of size 0.
Each of these files will also have two extended attributes in the system
attribute name space:
pnfsd.dsfile - This extended attrbute stores the information that
    the MDS needs to find the data storage file(s) on DS(s) for this file.
pnfsd.dsattr - This extended attribute stores the Size, AccessTime, ModifyTime
    and Change attributes for the file, so that the MDS doesn't need to
    acquire the attributes from the DS for every Getattr operation.
For each regular (VREG) file, the MDS creates a data storage file on one
(or more if mirroring is enabled) of the DSs in one of the &quot;dsNN&quot;
subdirectories.  The name of this file is the file handle
of the file on the MDS in hexadecimal so that the name is unique.
The DSs use subdirectories named &quot;ds0&quot; to &quot;dsN&quot; so that no one directory
gets too large. The value of &quot;N&quot; is set via the sysctl vfs.nfsd.dsdirsize
on the MDS, with the default being 20.
For production servers that will store a lot of files, this value should
probably be much larger.
It can be increased when the &quot;nfsd&quot; daemon is not running on the MDS,
once the &quot;dsK&quot; directories are created.

For pNFS aware NFSv4.1 clients, the FreeBSD server will return two pieces
of information to the client that allows it to do I/O directly to the DS.
DeviceInfo - This is relatively static information that defines what a DS
             is. The critical bits of information returned by the FreeBSD
             server is the IP address of the DS and, for the Flexible
             File layout, that NFSv4.1 is to be used and that it is
             &quot;tightly coupled&quot;.
             There is a &quot;deviceid&quot; which identifies the DeviceInfo.
Layout     - This is per file and can be recalled by the server when it
             is no longer valid. For the FreeBSD server, there is support
             for two types of layout, call File and Flexible File layout.
             Both allow the client to do I/O on the DS via NFSv4.1 I/O
             operations. The Flexible File layout is a more recent variant
             that allows specification of mirrors, where the client is
             expected to do writes to all mirrors to maintain them in a
             consistent state. The Flexible File layout also allows the
             client to report I/O errors for a DS back to the MDS.
             The Flexible File layout supports two variants referred to as
             &quot;tightly coupled&quot; vs &quot;loosely coupled&quot;. The FreeBSD server always
             uses the &quot;tightly coupled&quot; variant where the client uses the
             same credentials to do I/O on the DS as it would on the MDS.
             For the &quot;loosely coupled&quot; variant, the layout specifies a
             synthetic user/group that the client uses to do I/O on the DS.
             The FreeBSD server does not do striping and always returns
             layouts for the entire file. The critical information in a layout
             is Read vs Read/Writea and DeviceID(s) that identify which
             DS(s) the data is stored on.

At this time, the MDS generates File Layout layouts to NFSv4.1 clients
that know how to do pNFS for the non-mirrored DS case unless the sysctl
vfs.nfsd.default_flexfile is set non-zero, in which case Flexible File
layouts are generated.
The mirrored DS configuration always generates Flexible File layouts.
For NFS clients that do not support NFSv4.1 pNFS, all I/O operations
are done against the MDS which acts as a proxy for the appropriate DS(s).
When the MDS receives an I/O RPC, it will do the RPC on the DS as a proxy.
If the DS is on the same machine, the MDS/DS will do the RPC on the DS as
a proxy and so on, until the machine runs out of some resource, such as
session slots or mbufs.
As such, DSs must be separate systems from the MDS.

***

###[What does {some strange unix command name} stand for?](http://www.unixguide.net/unix/faq/1.3.shtml)

+ awk = &quot;Aho Weinberger and Kernighan&quot; 
+ grep = &quot;Global Regular Expression Print&quot; 
+ fgrep = &quot;Fixed GREP&quot;. 
+ egrep = &quot;Extended GREP&quot; 
+ cat = &quot;CATenate&quot; 
+ gecos = &quot;General Electric Comprehensive Operating Supervisor&quot; 
+ nroff = &quot;New ROFF&quot; 
+ troff = &quot;Typesetter new ROFF&quot; 
+ tee = T 
+ bss = &quot;Block Started by Symbol
+ biff = &quot;BIFF&quot; 
+ rc (as in &quot;.cshrc&quot; or &quot;/etc/rc&quot;) = &quot;RunCom&quot; 
+ Don Libes' book &quot;Life with Unix&quot; contains lots more of these 
tidbits. 
***

##Beastie Bits
+ [RetroBSD: Unix for microcontrollers](http://retrobsd.org/wiki/doku.php)
+ [On the matter of OpenBSD breaking embargos (KRACK)](https://marc.info/?l=openbsd-tech&amp;m=152910536208954&amp;w=2)
+ [Theo's Basement Computer Paradise (1998)](https://zeus.theos.com/deraadt/hosts.html)
+ [Airport Extreme runs NetBSD](https://jcs.org/2018/06/12/airport_ssh)
+ [What UNIX shell could have been](https://rain-1.github.io/shell-2.html)

***
Tarsnap ad
***

##Feedback/Questions
+ We need more feedback and questions. Please email feedback@bsdnow.tv 
+ Also, many of you owe us BSDCan trip reports! We have shared what our experience at BSDCan was like, but we want to hear about yours. What can we do better next year? What was it like being there for the first time?
+ [Jason writes in](https://slexy.org/view/s205jU58X2)
    + https://www.wheelsystems.com/en/products/wheel-fudo-psm/
+ [June 19th was National FreeBSD Day](https://twitter.com/search?src=typd&amp;q=%23FreeBSDDay)
***

- Send questions, comments, show ideas/topics, or stories you want mentioned on the show to [feedback@bsdnow.tv](mailto:feedback@bsdnow.tv)
***

</code></pre>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Introducing OPNsense, a pfSense fork (http://opnsense.org/)
OPNsense is a new BSD-based firewall project that was recently started (http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html), forked from the pfSense codebase
Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)
The core team (http://opnsense.org/about/about-opnsense/#opnsense-core-team) includes a well-known DragonFlyBSD developer
You can check out their code on Github (https://github.com/opnsense) now, or download an image and try it out - let us know (mailto:feedback@bsdnow.tv) if you do and what you think about it
They also have a nice wiki and some instructions on getting started (http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration) for new users
We plan on having them on the show next week to learn a bit more about how the project got started and why you might want to use it - stay tuned
***
Code rot and why I chose OpenBSD (http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html)
Here we have a blog post about rotting codebases - a core banking system in this example
The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project
He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born
Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it
The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds
"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."
It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"
Look for the phrase "Getting Started" in the blog post for a nice little gem
***
ZFS vs HAMMER FS (https://forums.freebsd.org/threads/zfs-vs-hammer.49789/)
One of the topics we've seen come up from time to time is how FreeBSD's ZFS (http://www.bsdnow.tv/tutorials/zfs) and DragonFly's HAMMER FS (http://www.bsdnow.tv/tutorials/hammer) compare to each other
They both have a lot of features that traditional filesystems lack
A forum thread was opened for discussion about them both and what they're typically used for
It compares resource requirements, ideal hardware and pros/cons of each
Hopefully someone will do another new comparison when HAMMER 2 is finished
This is not to be confused with the other "hammer" filesystem (https://www.youtube.com/watch?v=HBXlVl5Ll6k)
***
Portable OpenNTPD revived (https://www.mail-archive.com/tech@openbsd.org/msg21886.html)
With ISC's NTPd having so many security vulnerabilities recently, people need an alternative NTP daemon (http://www.bsdnow.tv/tutorials/ntpd)
OpenBSD has developed OpenNTPD (http://openntpd.org/) since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years
The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version
Brent Cook, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl) to talk about LibreSSL, decided it was time to fix this
While looking through the code, he also found some fixes (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist) for the native version as well
You can grab it from Github (https://github.com/openntpd-portable/openntpd-portable) now, or just wait for the updated release (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html) to hit the repos of your OS of choice
***
Interview - Ian Sutton - ian@kremlin.cc (mailto:ian@kremlin.cc)
BSD replacements (https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary) for systemd dependencies (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
News Roundup
pkgng adds OS X support (https://github.com/freebsd/pkg/pull/1113)
FreeBSD's next-gen package manager (http://www.bsdnow.tv/tutorials/pkgng) has just added support for Mac OS X
Why would you want that? Well.. we don't really know, but it's cool
The author of the patch may have some insight (https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964) about what his goal is though
This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc
There's also the possibility of pkgng being used as a packaging format for MacPorts in the future
While we're on the topic of pkgng, you can also watch bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries)'s latest presentation about it from ruBSD 2014 - "four years of pkg (http://is.gd/4AvUwt)"
***
Secure secure shell (https://stribika.github.io/2015/01/04/secure-secure-shell.html)
Almost everyone watching BSD Now probably uses OpenSSH (http://www.bsdnow.tv/tutorials/ssh-tmux) and has set up a server at one point or another
This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear
It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use
There are also good explanations for all the choices, based both on history and probability
Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled
We've also got a handy chart (http://ssh-comparison.quendi.de/comparison.html) to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***
Dissecting OpenBSD's divert(4) (http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/)
PF has a cool feature that not a lot of people seem to know about: divert
It lets you send packets to userspace, allowing you to inspect them a lot easier
This blog post, the first in a series, details all the cool things you can do with divert and how to use it
A very common example is with intrusion detection systems like Snort
***
Screen recording on FreeBSD (https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic)
This is a neat article about a topic we don't cover very often: making video content on BSD
In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg
There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing
It also includes lots of details and helpful screenshots throughout the process
You should make cool screencasts and send them to us
***
Feedback/Questions
Camio writes in (http://slexy.org/view/s21Zx0ktmb)
ezpzy writes in (http://slexy.org/view/s2vVR5Orhh)
Emett writes in (http://slexy.org/view/s21Ahb5Lxa)
Ben writes in (http://slexy.org/view/s20oJmveN6)
Laszlo writes in (http://slexy.org/view/s2cTayMxPk)
***
Mailing List Gold
Protocol X97 (https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html)
My thoughts echoed (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2)
Vulnerability sample (http://www.openwall.com/lists/oss-security/2015/01/04/10)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>53: It's HAMMER Time</title>
  <link>https://www.bsdnow.tv/53</link>
  <guid isPermaLink="false">ef498915-45f4-4dbb-87fc-4f8e9ee65342</guid>
  <pubDate>Wed, 03 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ef498915-45f4-4dbb-87fc-4f8e9ee65342.mp3" length="56493652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our one year anniversary episode, and we'll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it's going. After that, we'll show you the ins and outs of DragonFly's HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's our one year anniversary episode, and we'll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it's going. After that, we'll show you the ins and outs of DragonFly's HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD foundation's new IPSEC project (http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html)
The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code
With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance
This new work will add AES-CTR and AES-GCM modes to FreeBSD's implementation, borrowing some code from OpenBSD
The updated stack will also support AES-NI for hardware-based encryption speed ups
It's expected to be completed by the end of September, and will also be in pfSense 2.2
***
NetBSD at Shimane Open Source Conference 2014 (http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html)
The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23
One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary
They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations
Some visitors said that NetBSD had the most chaotic booth at the conference
***
pfSense 2.1.5 released (https://blog.pfsense.org/?p=1401)
A new version of the pfSense 2.1 branch is out
Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has still not patched (https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html) in -RELEASE after nearly a month)
It also includes many other bug fixes, check the blog post for the full list
***
Systems, Science and FreeBSD (http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4)
Our friend George Neville-Neil (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) gave a presentation at Microsoft Research
It's mainly about using FreeBSD as a platform for research, inside and outside of universities
The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***
Interview - Reyk Floeter - reyk@openbsd.org (mailto:reyk@openbsd.org) / @reykfloeter (https://twitter.com/reykfloeter)
OpenBSD's HTTP daemon
Tutorial
A crash course on HAMMER FS (http://www.bsdnow.tv/tutorials/hammer)
News Roundup
OpenBSD's rcctl tool usage (http://brynet.biz.tm/article-rcctl.html)
OpenBSD recently got a new tool (http://undeadly.org/cgi?action=article&amp;amp;sid=20140820090351) for managing /etc/rc.conf.local in -current
Similar to FreeBSD's "sysrc" tool, it eliminates the need to manually edit rc.conf.local to enable or disable services
This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services
It won't make it to 5.6, but will be in 5.7 (next May)
***
pfSense mini-roundup (http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/)
We found five interesting pfSense articles throughout the week and wanted to quickly mention them
The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a "smart" DNS service
The second post (http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/) talks about setting ip IPv6, in particular if Comcast is your ISP
The third one (http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml) features pfSense on Softpedia, a more mainstream tech site
The fourth post (http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/) describes how to filter HTTPS traffic with Squid and pfSense
The last article (http://pfsensesetup.com/vpn-tunneling-with-tinc/) describes setting up a VPN using the "tinc (https://en.wikipedia.org/wiki/Tinc_%28protocol%29)" daemon and pfSense
It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it's interesting to read about
This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***
OpenBSD's new buffer cache (http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm)
OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work
Initial tests show positive results in terms of cache responsiveness
Check the post for all the fine details
***
BSDTalk episode 244 (http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html)
Another new BSDTalk is up and, this time around, Will Backman (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) interviews Ken Moore, the developer of the new BSD desktop environment
They discuss the history of development, differences between it and other DEs, lots of topics
If you're more of a visual person, fear not, because...
We'll have Ken on next week, including a full "virtual walkthrough" of Lumina and its applications
***
Feedback/Questions
Ghislain writes in (http://slexy.org/view/s21G3KL6lv)
Raynold writes in (http://slexy.org/view/s21USZdk2D)
Van writes in (http://slexy.org/view/s2IWAfkDfX)
Sean writes in (http://slexy.org/view/s2OBhezoDV)
Stefan writes in (http://slexy.org/view/s22h9RhXUy)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, party, rave, dubstep, hammer, hammerfs, hammer fs, filesystem, zfs, dragonfly, matthew dillon, cluster, lumina, ipsec, rcctl, pfsense, reyk floeter, openhttpd, nginx, apache, webserver</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our one year anniversary episode, and we&#39;ll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it&#39;s going. After that, we&#39;ll show you the ins and outs of DragonFly&#39;s HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html" rel="nofollow">FreeBSD foundation&#39;s new IPSEC project</a></h3>

<ul>
<li>The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code</li>
<li>With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance</li>
<li>This new work will add AES-CTR and AES-GCM modes to FreeBSD&#39;s implementation, borrowing some code from OpenBSD</li>
<li>The updated stack will also support AES-NI for hardware-based encryption speed ups</li>
<li>It&#39;s expected to be completed by the end of September, and will also be in pfSense 2.2
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html" rel="nofollow">NetBSD at Shimane Open Source Conference 2014</a></h3>

<ul>
<li>The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23</li>
<li>One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary</li>
<li>They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations</li>
<li>Some visitors said that NetBSD had the most chaotic booth at the conference
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1401" rel="nofollow">pfSense 2.1.5 released</a></h3>

<ul>
<li>A new version of the pfSense 2.1 branch is out</li>
<li>Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html" rel="nofollow">still not patched</a> in -RELEASE after nearly a month)</li>
<li>It also includes many other bug fixes, check the blog post for the full list
***</li>
</ul>

<h3><a href="http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4" rel="nofollow">Systems, Science and FreeBSD</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">George Neville-Neil</a> gave a presentation at Microsoft Research</li>
<li>It&#39;s mainly about using FreeBSD as a platform for research, inside and outside of universities</li>
<li>The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***</li>
</ul>

<h2>Interview - Reyk Floeter - <a href="mailto:reyk@openbsd.org" rel="nofollow">reyk@openbsd.org</a> / <a href="https://twitter.com/reykfloeter" rel="nofollow">@reykfloeter</a></h2>

<p>OpenBSD&#39;s HTTP daemon</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">A crash course on HAMMER FS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://brynet.biz.tm/article-rcctl.html" rel="nofollow">OpenBSD&#39;s rcctl tool usage</a></h3>

<ul>
<li>OpenBSD recently <a href="http://undeadly.org/cgi?action=article&sid=20140820090351" rel="nofollow">got a new tool</a> for managing /etc/rc.conf.local in -current</li>
<li>Similar to FreeBSD&#39;s &quot;sysrc&quot; tool, it eliminates the need to manually edit rc.conf.local to enable or disable services</li>
<li>This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services</li>
<li>It won&#39;t make it to 5.6, but will be in 5.7 (next May)
***</li>
</ul>

<h3><a href="http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/" rel="nofollow">pfSense mini-roundup</a></h3>

<ul>
<li>We found five interesting pfSense articles throughout the week and wanted to quickly mention them</li>
<li>The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a &quot;smart&quot; DNS service</li>
<li>The <a href="http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/" rel="nofollow">second post</a> talks about setting ip IPv6, in particular if Comcast is your ISP</li>
<li>The <a href="http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml" rel="nofollow">third one</a> features pfSense on Softpedia, a more mainstream tech site</li>
<li>The <a href="http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/" rel="nofollow">fourth post</a> describes how to filter HTTPS traffic with Squid and pfSense</li>
<li>The <a href="http://pfsensesetup.com/vpn-tunneling-with-tinc/" rel="nofollow">last article</a> describes setting up a VPN using the &quot;<a href="https://en.wikipedia.org/wiki/Tinc_%28protocol%29" rel="nofollow">tinc</a>&quot; daemon and pfSense</li>
<li>It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it&#39;s interesting to read about</li>
<li>This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm" rel="nofollow">OpenBSD&#39;s new buffer cache</a></h3>

<ul>
<li>OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work</li>
<li>Initial tests show positive results in terms of cache responsiveness</li>
<li>Check the post for all the fine details
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html" rel="nofollow">BSDTalk episode 244</a></h3>

<ul>
<li>Another new BSDTalk is up and, this time around, <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">Will Backman</a> interviews Ken Moore, the developer of the new BSD desktop environment</li>
<li>They discuss the history of development, differences between it and other DEs, lots of topics</li>
<li>If you&#39;re more of a visual person, fear not, because...</li>
<li>We&#39;ll have Ken on <em>next week</em>, including a full &quot;virtual walkthrough&quot; of Lumina and its applications
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G3KL6lv" rel="nofollow">Ghislain writes in</a></li>
<li><a href="http://slexy.org/view/s21USZdk2D" rel="nofollow">Raynold writes in</a></li>
<li><a href="http://slexy.org/view/s2IWAfkDfX" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s2OBhezoDV" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s22h9RhXUy" rel="nofollow">Stefan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our one year anniversary episode, and we&#39;ll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it&#39;s going. After that, we&#39;ll show you the ins and outs of DragonFly&#39;s HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html" rel="nofollow">FreeBSD foundation&#39;s new IPSEC project</a></h3>

<ul>
<li>The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code</li>
<li>With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance</li>
<li>This new work will add AES-CTR and AES-GCM modes to FreeBSD&#39;s implementation, borrowing some code from OpenBSD</li>
<li>The updated stack will also support AES-NI for hardware-based encryption speed ups</li>
<li>It&#39;s expected to be completed by the end of September, and will also be in pfSense 2.2
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html" rel="nofollow">NetBSD at Shimane Open Source Conference 2014</a></h3>

<ul>
<li>The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23</li>
<li>One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary</li>
<li>They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations</li>
<li>Some visitors said that NetBSD had the most chaotic booth at the conference
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1401" rel="nofollow">pfSense 2.1.5 released</a></h3>

<ul>
<li>A new version of the pfSense 2.1 branch is out</li>
<li>Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html" rel="nofollow">still not patched</a> in -RELEASE after nearly a month)</li>
<li>It also includes many other bug fixes, check the blog post for the full list
***</li>
</ul>

<h3><a href="http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4" rel="nofollow">Systems, Science and FreeBSD</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">George Neville-Neil</a> gave a presentation at Microsoft Research</li>
<li>It&#39;s mainly about using FreeBSD as a platform for research, inside and outside of universities</li>
<li>The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***</li>
</ul>

<h2>Interview - Reyk Floeter - <a href="mailto:reyk@openbsd.org" rel="nofollow">reyk@openbsd.org</a> / <a href="https://twitter.com/reykfloeter" rel="nofollow">@reykfloeter</a></h2>

<p>OpenBSD&#39;s HTTP daemon</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">A crash course on HAMMER FS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://brynet.biz.tm/article-rcctl.html" rel="nofollow">OpenBSD&#39;s rcctl tool usage</a></h3>

<ul>
<li>OpenBSD recently <a href="http://undeadly.org/cgi?action=article&sid=20140820090351" rel="nofollow">got a new tool</a> for managing /etc/rc.conf.local in -current</li>
<li>Similar to FreeBSD&#39;s &quot;sysrc&quot; tool, it eliminates the need to manually edit rc.conf.local to enable or disable services</li>
<li>This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services</li>
<li>It won&#39;t make it to 5.6, but will be in 5.7 (next May)
***</li>
</ul>

<h3><a href="http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/" rel="nofollow">pfSense mini-roundup</a></h3>

<ul>
<li>We found five interesting pfSense articles throughout the week and wanted to quickly mention them</li>
<li>The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a &quot;smart&quot; DNS service</li>
<li>The <a href="http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/" rel="nofollow">second post</a> talks about setting ip IPv6, in particular if Comcast is your ISP</li>
<li>The <a href="http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml" rel="nofollow">third one</a> features pfSense on Softpedia, a more mainstream tech site</li>
<li>The <a href="http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/" rel="nofollow">fourth post</a> describes how to filter HTTPS traffic with Squid and pfSense</li>
<li>The <a href="http://pfsensesetup.com/vpn-tunneling-with-tinc/" rel="nofollow">last article</a> describes setting up a VPN using the &quot;<a href="https://en.wikipedia.org/wiki/Tinc_%28protocol%29" rel="nofollow">tinc</a>&quot; daemon and pfSense</li>
<li>It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it&#39;s interesting to read about</li>
<li>This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm" rel="nofollow">OpenBSD&#39;s new buffer cache</a></h3>

<ul>
<li>OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work</li>
<li>Initial tests show positive results in terms of cache responsiveness</li>
<li>Check the post for all the fine details
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html" rel="nofollow">BSDTalk episode 244</a></h3>

<ul>
<li>Another new BSDTalk is up and, this time around, <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">Will Backman</a> interviews Ken Moore, the developer of the new BSD desktop environment</li>
<li>They discuss the history of development, differences between it and other DEs, lots of topics</li>
<li>If you&#39;re more of a visual person, fear not, because...</li>
<li>We&#39;ll have Ken on <em>next week</em>, including a full &quot;virtual walkthrough&quot; of Lumina and its applications
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G3KL6lv" rel="nofollow">Ghislain writes in</a></li>
<li><a href="http://slexy.org/view/s21USZdk2D" rel="nofollow">Raynold writes in</a></li>
<li><a href="http://slexy.org/view/s2IWAfkDfX" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s2OBhezoDV" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s22h9RhXUy" rel="nofollow">Stefan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>30: Documentation is King</title>
  <link>https://www.bsdnow.tv/30</link>
  <guid isPermaLink="false">ab836072-6c9b-4d13-9011-8d9ddf4294e7</guid>
  <pubDate>Wed, 26 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ab836072-6c9b-4d13-9011-8d9ddf4294e7.mp3" length="59694113" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
OpenBSD on a Sun T5120 (http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120)
Our buddy Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) got himself a cool Sun box
Of course he had to write a post about installing and running OpenBSD on it
The post goes through some of the quirks and steps to go through in case you're interested in one of these fine SPARC machines
He's also got another post about OpenBSD on a Dell CS24-SC server (http://www.tedunangst.com/flak/post/Dell-CS24-SC-server)
***
Bhyvecon 2014 videos are up (https://www.youtube.com/results?search_query=bhyvecon%20tokyo&amp;amp;sm=3)
Like we mentioned last week, Bhyvecon (http://bhyvecon.org/) was an almost-impromptu conference before AsiaBSDCon
The talks have apparently already been uploaded!
Subjects include Bhyve's past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization
Lots more detail in the videos, so check 'em all out
***
Building a FreeBSD wireless access point (http://blog.khubla.com/freebsd/building-my-own-wireless-point)
We've got a new blog post about creating a wireless access point with FreeBSD
After all the recent news of consumer routers being pwned like candy, it's time for people to start building BSD routers (http://www.bsdnow.tv/tutorials/openbsd-router)
The author goes through a lot of the process of getting one set up using good ol' FreeBSD
Using hostapd, he's able to share his wireless card in hostap mode and offer DHCP to all the clients
Plenty of config files and more messy details in the post
***
Switching from Synology to FreeNAS (http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/)
The author has been considering getting a NAS for quite a while and documents his research
He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY
After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice
The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***
Interview - Warren Block - wblock@freebsd.org (mailto:wblock@freebsd.org)
FreeBSD's documentation project, igor, doceng
Tutorial
The world of BSD mailing lists (http://www.bsdnow.tv/tutorials/mailing-lists)
News Roundup
HAMMER2 work and notes (http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html)
Matthew Dillon has posted some updated notes about the development of the new HAMMER version
The start of a cluster API was committed to the tree
There are also links to design document, a freemap design document, a changes list and a todo list
***
BSD Breaking Barriers (https://www.youtube.com/watch?v=buo5JlMnGPI)
Our friend MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) gave a talk at NYCBSDCon about BSD "breaking barriers"
"What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We'll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years."
He also has another upcoming talk, (or "webcast") called "Beyond Security: Getting to Know OpenBSD's Real Purpose (http://oreillynet.com/pub/e/3059)"
"OpenBSD is frequently billed as a high-security operating system. That's true, but security isn't the OpenBSD Project's main goal. This webcast will introduce systems administrators to OpenBSD, explain the project's mission, and discuss the features and benefits."
It's on May 27th and will hopefully be recorded
***
FreeBSD in a chroot (http://dreamcat4.github.io/finch/)
Finch, "FreeBSD running IN a CHroot," is a new project
It's a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)
All the details and some interesting use cases are on the github page
He really needs to change the project name (https://www.freshports.org/net-im/finch) though
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/)
Lots of bugfixes for PCBSD coming down the tubes
LZ4 compression is now enabled by default on the whole pool
The latest 10-STABLE has been imported and builds are going
Also the latest GNOME and Cinnamon builds have been imported and much more
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s20SlvTcwd) (IRC suggests md5deep)
Don writes in (http://slexy.org/view/s2PeMqXFid)
kaltheat writes in (http://slexy.org/view/s21yii6KZe) (We use R0DE Podcast microphones and Logitech C920 HD webcams)
Harri writes in (http://slexy.org/view/s21SkX19Cp)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rtfm, mailing lists, lists, documentation, doceng, igor, man pages, manpages, wireless, access point, wap, router, pfsense, sun, t5120, dell, cs24-c, server, bhyve, bhyvecon, asiabsdcon, 2014, synology, freenas, ixsystems, megaport, foundation, rack, datacenter, mail, hammer, hammer2, hammerfs, fs, filesystem, rump kernels</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
