<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 11 Apr 2026 13:42:39 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Launchd”</title>
    <link>https://www.bsdnow.tv/tags/launchd</link>
    <pubDate>Wed, 02 Sep 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>105: Virginia BSD Assembly</title>
  <link>https://www.bsdnow.tv/105</link>
  <guid isPermaLink="false">09c955b0-1ecf-440f-9aa9-80dc2fb05a49</guid>
  <pubDate>Wed, 02 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/09c955b0-1ecf-440f-9aa9-80dc2fb05a49.mp3" length="47635924" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.</itunes:subtitle>
  <itunes:duration>1:06:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD hypervisor coming soon (https://www.marc.info/?l=openbsd-tech&amp;amp;m=144104398132541&amp;amp;w=2)
Our buddy Mike Larkin never rests, and he posted some very tight-lipped console output (http://pastebin.com/raw.php?i=F2Qbgdde) on Twitter recently
From what little he revealed at the time (https://twitter.com/mlarkin2012/status/638265767864070144), it appeared to be a new hypervisor (https://en.wikipedia.org/wiki/Hypervisor) (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled "vmm"
Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is
Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation
One thing to note: this isn't just a port of something like Xen or Bhyve; it's all-new code, and Mike explains why he chose to go that route
He also answered some basic questions about the requirements, when it'll be available, what OSes it can run, what's left to do, how to get involved and so on
***
Why FreeBSD should not adopt launchd (http://blog.darknedgy.net/technology/2015/08/26/0/)
Last week (http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519) we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD
One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we've learned)
In this article, the author talks about why he thinks this is a bad idea
He doesn't oppose the integration into FreeBSD-derived projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail
The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities
Reddit had quite a bit (https://www.reddit.com/r/BSD/comments/3ilhpk) to say (https://www.reddit.com/r/freebsd/comments/3ilj4i) about this one, some in agreement and some not
***
DragonFly graphics improvements (http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html)
The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack
This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs
You should also see some power management improvements, longer battery life and various other bug fixes
If you're running DragonFly, especially on a laptop, you'll want to get this stuff on your machine quick - big improvements all around
***
OpenBSD tames the userland (https://www.marc.info/?l=openbsd-tech&amp;amp;m=144070638327053&amp;amp;w=2)
Last week we mentioned OpenBSD's tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are
Theo posted a mega diff of nearly 100 smaller diffs, adding tame support to many areas of the userland tools
It's still a work-in-progress version; there's still more to be added (including the file path whitelist stuff)
Some classic utilities are even being reworked to make taming them easier - the "w" command (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144103945031253&amp;amp;w=2), for example
The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)
More discussion can be found on HN (https://news.ycombinator.com/item?id=10135901), as one might expect
If you're a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***
Interview - Scott Courtney - vbsdcon@verisign.com (mailto:vbsdcon@verisign.com) / @verisign (https://twitter.com/verisign)
vBSDCon (http://vbsdcon.com/) 2015
News Roundup
OPNsense, beyond the fork (https://opnsense.org/opnsense-beyond-the-fork)
We first heard about (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) OPNsense back in January, and they've since released nearly 40 versions, spanning over 5,000 commits
This is their first big status update, covering some of the things that've happened since the project was born
There's been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***
LibreSSL nukes SSLv3 (http://undeadly.org/cgi?action=article&amp;amp;sid=20150827112006)
With their latest release, LibreSSL began to turn off SSLv3 (http://disablessl3.com) support, starting with the "openssl" command
At the time, SSLv3 wasn't disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)
They've now flipped the switch, and the process of complete removal has started
From the Undeadly summary, "This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!"
With this change and a few more to follow shortly, LibreSSL won't actually support SSL anymore - time to rename it "LibreTLS"
***
FreeBSD MPTCP updated (http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt)
For anyone unaware, Multipath TCP (https://en.wikipedia.org/wiki/Multipath_TCP) is "an ongoing effort of the Internet Engineering Task Force's (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy."
There's been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated
Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements
Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***
UEFI and GPT in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144092912907778&amp;amp;w=2)
There hasn't been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently
Some support (https://github.com/yasuoka/openbsd-uefi) for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review
This comes along with a number (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143732984925140&amp;amp;w=2) of (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144088136200753&amp;amp;w=2) other (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144046793225230&amp;amp;w=2) commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144045760723039&amp;amp;w=2) related to GPT, much of which is being refactored and slowly reintroduced
Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should "just work" with GPT (once everything's in)
The UEFI bootloader support has been committed (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144115942223734&amp;amp;w=2), so stay tuned for more updates (http://undeadly.org/cgi?action=article&amp;amp;sid=20150902074526&amp;amp;mode=flat) as further (https://twitter.com/kotatsu_mi/status/638909417761562624) progress (https://twitter.com/yojiro/status/638189353601097728) is made
***
Feedback/Questions
John writes in (http://slexy.org/view/s2sIWfb3Qh)
Mason writes in (http://slexy.org/view/s2Ybrx00KI)
Earl writes in (http://slexy.org/view/s20FpmR7ZW)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, verisign, vbsdcon, conference, eurobsdcon, bsdcan, meetbsd, asiabsdcon, nextbsd, launchd, darwin, tame, mach, libressl, vmm, hypervisor, bhyve, multipath, tcp</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>92: BSD After Midnight</title>
  <link>https://www.bsdnow.tv/92</link>
  <guid isPermaLink="false">9d0d8811-2914-45e0-a34f-9638d2c4e761</guid>
  <pubDate>Wed, 03 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9d0d8811-2914-45e0-a34f-9638d2c4e761.mp3" length="48412372" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Zocker, it's like docker on FreeBSD (http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html)
Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they're working on native FreeBSD support at the moment
This blog post is about a docker-like script, mainly for ease-of-use, that uses only jails and ZFS in the base system
In total, it's 1,500 lines of shell script (https://github.com/toddnni/zocker)
The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration
In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***
Patrol Read in OpenBSD (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143285964216970&amp;amp;w=4)
OpenBSD has recently imported some new code to support the Patrol Read (http://www.intel.com/support/motherboards/server/sb/CS-028742.htm) function of some RAID controllers
In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool "scrub" operation
The goal is to protect file integrity by detecting drive failures before they can damage your data
It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***
HAMMER 2 improvements (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html)
DragonFly BSD has been working on the second generation HAMMER FS
It now uses LZ4 compression by default, which we've been big fans of in ZFS
They've also switched to a faster CRC (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html) algorithm, further improving HAMMER's performance, especially (http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html) when using iSCSI
***
FreeBSD foundation May update (https://www.freebsdfoundation.org/press/2015mayupdate.pdf)
The FreeBSD foundation has published another update newsletter, detailing some of the things they've been up to lately
In it, you'll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation
Some improvements were also made to FreeBSD's release building process for non-X86 architectures
There's also an AsiaBSDCon recap that covers some of the presentations and the dev events
They also have an accompanying blog post (http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html) where Glen Barber talks about more sysadmin and clusteradm work at NYI
***
Interview - Lucas Holt - questions@midnightbsd.org (mailto:questions@midnightbsd.org) / @midnightbsd (https://twitter.com/midnightbsd)
MidnightBSD
News Roundup
The launchd on train is never coming (http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html)
Replacement of init systems has been quite controversial in the last few years
Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port launchd from OS X (https://en.wikipedia.org/wiki/Launchd)
This blog post details the author's opinion on why he thinks we're never going to have launchd in any of the BSDs
Email us your thoughts on the matter
***
Native SSH comes to… Windows (http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx)
In what may be the first (and last) mention of Microsoft on BSD Now...
They've just recently announced that PowerShell will get native SSH support in the near future
It's not based on the commercial SSH either, it's the same one from OpenBSD that we already use everywhere
Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions
The announcement also promises that they'll be working with the OpenSSH community, so we'll see how many Microsoft-submitted patches make it upstream (or how many donations (http://www.openbsdfoundation.org/index.html) they make)
***
Moving to FreeBSD (http://www.textplain.net/blog/2015/moving-to-freebsd/)
This blog post describes a long-time Linux user's first BSD switching experience
The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd
After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is
He also plans to write about his experience with other BSDs, and is writing some tutorials too - we'll check in with him again later on
***
Feedback/Questions
Adam writes in (http://slexy.org/view/s29hS2cI05)
Dan writes in (http://slexy.org/view/s20VRZYBsw)
Ivan writes in (http://slexy.org/view/s20bumJ5u9)
Josh writes in (http://slexy.org/view/s21BU6Pnka)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, midnightbsd, ghostbsd, zocker, docker, hammerfs, powershell, patrol read, openssh, launchd, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Introducing OPNsense, a pfSense fork (http://opnsense.org/)
OPNsense is a new BSD-based firewall project that was recently started (http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html), forked from the pfSense codebase
Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)
The core team (http://opnsense.org/about/about-opnsense/#opnsense-core-team) includes a well-known DragonFlyBSD developer
You can check out their code on Github (https://github.com/opnsense) now, or download an image and try it out - let us know (mailto:feedback@bsdnow.tv) if you do and what you think about it
They also have a nice wiki and some instructions on getting started (http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration) for new users
We plan on having them on the show next week to learn a bit more about how the project got started and why you might want to use it - stay tuned
***
Code rot and why I chose OpenBSD (http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html)
Here we have a blog post about rotting codebases - a core banking system in this example
The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project
He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born
Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it
The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds
"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."
It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"
Look for the phrase "Getting Started" in the blog post for a nice little gem
***
ZFS vs HAMMER FS (https://forums.freebsd.org/threads/zfs-vs-hammer.49789/)
One of the topics we've seen come up from time to time is how FreeBSD's ZFS (http://www.bsdnow.tv/tutorials/zfs) and DragonFly's HAMMER FS (http://www.bsdnow.tv/tutorials/hammer) compare to each other
They both have a lot of features that traditional filesystems lack
A forum thread was opened for discussion about them both and what they're typically used for
It compares resource requirements, ideal hardware and pros/cons of each
Hopefully someone will do another new comparison when HAMMER 2 is finished
This is not to be confused with the other "hammer" filesystem (https://www.youtube.com/watch?v=HBXlVl5Ll6k)
***
Portable OpenNTPD revived (https://www.mail-archive.com/tech@openbsd.org/msg21886.html)
With ISC's NTPd having so many security vulnerabilities recently, people need an alternative NTP daemon (http://www.bsdnow.tv/tutorials/ntpd)
OpenBSD has developed OpenNTPD (http://openntpd.org/) since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years
The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version
Brent Cook, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl) to talk about LibreSSL, decided it was time to fix this
While looking through the code, he also found some fixes (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist) for the native version as well
You can grab it from Github (https://github.com/openntpd-portable/openntpd-portable) now, or just wait for the updated release (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html) to hit the repos of your OS of choice
***
Interview - Ian Sutton - ian@kremlin.cc (mailto:ian@kremlin.cc)
BSD replacements (https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary) for systemd dependencies (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
News Roundup
pkgng adds OS X support (https://github.com/freebsd/pkg/pull/1113)
FreeBSD's next-gen package manager (http://www.bsdnow.tv/tutorials/pkgng) has just added support for Mac OS X
Why would you want that? Well.. we don't really know, but it's cool
The author of the patch may have some insight (https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964) about what his goal is though
This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc
There's also the possibility of pkgng being used as a packaging format for MacPorts in the future
While we're on the topic of pkgng, you can also watch bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries)'s latest presentation about it from ruBSD 2014 - "four years of pkg (http://is.gd/4AvUwt)"
***
Secure secure shell (https://stribika.github.io/2015/01/04/secure-secure-shell.html)
Almost everyone watching BSD Now probably uses OpenSSH (http://www.bsdnow.tv/tutorials/ssh-tmux) and has set up a server at one point or another
This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear
It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use
There are also good explanations for all the choices, based both on history and probability
Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled
We've also got a handy chart (http://ssh-comparison.quendi.de/comparison.html) to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***
Dissecting OpenBSD's divert(4) (http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/)
PF has a cool feature that not a lot of people seem to know about: divert
It lets you send packets to userspace, allowing you to inspect them a lot easier
This blog post, the first in a series, details all the cool things you can do with divert and how to use it
A very common example is with intrusion detection systems like Snort
***
Screen recording on FreeBSD (https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic)
This is a neat article about a topic we don't cover very often: making video content on BSD
In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg
There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing
It also includes lots of details and helpful screenshots throughout the process
You should make cool screencasts and send them to us
***
Feedback/Questions
Camio writes in (http://slexy.org/view/s21Zx0ktmb)
ezpzy writes in (http://slexy.org/view/s2vVR5Orhh)
Emett writes in (http://slexy.org/view/s21Ahb5Lxa)
Ben writes in (http://slexy.org/view/s20oJmveN6)
Laszlo writes in (http://slexy.org/view/s2cTayMxPk)
***
Mailing List Gold
Protocol X97 (https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html)
My thoughts echoed (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2)
Vulnerability sample (http://www.openwall.com/lists/oss-security/2015/01/04/10)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
