<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 13:47:30 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Linux Foundation”</title>
    <link>https://www.bsdnow.tv/tags/linux%20foundation</link>
    <pubDate>Wed, 25 Feb 2015 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>78: From the Foundation (Part 2)</title>
  <link>https://www.bsdnow.tv/78</link>
  <guid isPermaLink="false">6999608e-fe27-4efa-96b0-eb1e928acf0a</guid>
  <pubDate>Wed, 25 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6999608e-fe27-4efa-96b0-eb1e928acf0a.mp3" length="50146996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2015 schedule (https://www.bsdcan.org/2015/schedule/)
The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well
Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada
This year's conference will have a massive fifty talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)
Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  "birds of a feather" gatherings
In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks
That's not the ideal balance (https://twitter.com/bsdcan/status/570394627158773760) we'd hope for, but BSDCan says (https://twitter.com/bsdcan/status/570398181864972288) they'll try to improve that next year
Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)
Michael Lucas (who's on the BSDCan board) wrote up a blog post (http://blather.michaelwlucas.com/archives/2325) about the proposals and rejections this year
If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available
We also interviewed Dan Langille (http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north) about the conference and what to expect this year, so check that out too
***
SSL interception with relayd (http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception)
There was a lot of commotion recently about superfish (http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/), a way that Lenovo was intercepting HTTPS traffic and injecting advertisements
If you're running relayd (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8), you can mimic this evil setup on your own networks (just for testing of course…)
Reyk Floeter (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time), the guy who wrote relayd, came up a blog post about how to do just that (https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf)
It starts off with some backstory and some of the things relayd is capable of
relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL
When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario
The post is very long, with lots of details (https://www.marc.info/?l=openbsd-tech&amp;amp;m=135887624714548&amp;amp;w=2) and some sample config files - the whole nine yards
***
OPNsense 15.1.6.1 released (https://forum.opnsense.org/index.php?topic=77.0)
The OPNsense team has released yet another version in rapid succession, but this one has some big changes
It's now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)
This version also features a new tool for easily upgrading between versions, simply called "opnsense-update" (similar to freebsd-update)
It also includes security fixes for BIND (https://kb.isc.org/article/AA-01235) and PHP (http://php.net/ChangeLog-5.php#5.6.6), as well as some other assorted bug fixes
The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)
With the news of m0n0wall shutting down last week, they've also released bare minimum hardware specifications required to run OPNsense on embedded devices
Encouraged by last week's mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental images built against LibreSSL (https://forum.opnsense.org/index.php?topic=78.0) for testing (and have instructions on how to switch over without reinstalling)
***
OpenBSD on a Minnowboard Max (http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html)
What would our show be without at least one story about someone installing BSD on a weird device
For once, it's actually not NetBSD…
This article is about the minnowboard max (http://www.minnowboard.org/meet-minnowboard-max/), a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi
It's using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)
The author describes his entirely solid-state setup, noting that there's virtually no noise, no concern about hard drives dying and very reasonable power usage
You'll find instructions on how to get OpenBSD installed and going throughout the rest of the article
Have a look at the spec sheet if you're interested, they make for cool little BSD boxes
***
Netmap for 40gbit NICs in FreeBSD (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html)
Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he's just committed
The ixl(4) driver, that's one for the X1710 40-gigabit card, now has netmap support
It's currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too
This should make for some serious packet-pushing power
If you have any network hardware like this, he would appreciate testing for the new code
***
Interview - Ken Westerback - directors@openbsdfoundation.org (mailto:directors@openbsdfoundation.org)
The OpenBSD foundation (http://www.openbsdfoundation.org/donations.html)'s activities
News Roundup
s2k15 hackathon report: dhclient/dhcpd/fdisk (http://undeadly.org/cgi?action=article&amp;amp;sid=20150221222235)
The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to
Ken was also busy, getting a few networking-related things fixed and improved in the base system
He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd
The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it
There's apparently plans for "dhclientng" - presumably a big improvement (rewrite?) of dhclient
***
FreeBSD beginner video series (https://www.youtube.com/user/bsdtutorial/videos)
A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD
We usually assume that people who watch the show are already familiar with basic concepts, but they'd be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand
So far, he's covered how to get FreeBSD (https://www.youtube.com/watch?v=D26rOHkI-iE), an introduction to installing in VirtualBox (https://www.youtube.com/watch?v=PCyYW19bPDU), a simple installation (https://www.youtube.com/watch?v=HCE89kObutA) or a more in-depth manual installation (https://www.youtube.com/watch?v=OwqCjz9Fgao), navigating the filesystem (https://www.youtube.com/watch?v=6YJhdOGjN50), basic ssh use (https://www.youtube.com/watch?v=Yl5Bg2qz21I), managing users and groups (https://www.youtube.com/watch?v=ioB73i7QUjI) and finally some basic editing (https://www.youtube.com/watch?v=VxxbO-gt9FA) with vi (https://www.youtube.com/watch?v=16FNtCj-uS4) and a few other topics
Everyone's gotta start somewhere and, with a little bit of initial direction, today's newbies could be tomorrow's developers
It should be an ongoing series with more topics to come
***
NetBSD tests: zero unexpected failures (https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to)
The NetBSD guys have a new blog post up about their testing suite (http://wiki.netbsd.org/tutorials/atf/) for all the CPU architectures
They've finally gotten the number of "expected" failures down to zero on a few select architectures
Results are published (http://releng.netbsd.org/test-results.html) on a special release engineering page, so you can have a look if you're interested
The rest of the post links to the "top performers" (ones with less than ten failure) in the -current branch
***
PCBSD switches to IPFW (https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace)
The PCBSD crew continues their recent series of switching between major competing features
This time, they've switched the default firewall away from PF to FreeBSD's native IPFW firewall
Look forward to Kris wearing a "keep calm and use IPFW" shir- wait
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s21U6Ln6wC)
Dan writes in (http://slexy.org/view/s2Kp0xdfIb)
Florian writes in (http://slexy.org/view/s216DcA8DP)
Sean writes in (http://slexy.org/view/s271iJjqtQ)
Chris writes in (http://slexy.org/view/s21zerHI9P)
***
Mailing List Gold
VCS flamebait (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142454205416445&amp;amp;w=2)
Hidden agenda (https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openbsd foundation, donations, openssh, funding, hackathon, gsoc, core infrastructure initiative, linux foundation, charity, lenovo, superfish, relayd, opnsense, soekris</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We&#39;ve also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it&#39;s going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year&#39;s conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  &quot;birds of a feather&quot; gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That&#39;s not the <a href="https://twitter.com/bsdcan/status/570394627158773760" rel="nofollow">ideal balance</a> we&#39;d hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" rel="nofollow">BSDCan says</a> they&#39;ll try to improve that next year</li>
<li>Those numbers are based on the speaker&#39;s background, or any past presentations, for the few whose actual topic wasn&#39;t made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who&#39;s on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">a blog post</a> about the proposals and rejections this year</li>
<li>If you can&#39;t make it this year, don&#39;t worry, we&#39;ll be sure to announce the recordings when they&#39;re made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" rel="nofollow">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" rel="nofollow">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" rel="nofollow">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you&#39;re running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" rel="nofollow">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" rel="nofollow">just that</a></li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&m=135887624714548&w=2" rel="nofollow">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" rel="nofollow">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It&#39;s now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called &quot;opnsense-update&quot; (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" rel="nofollow">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" rel="nofollow">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they&#39;ve also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week&#39;s mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" rel="nofollow">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" rel="nofollow">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it&#39;s actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" rel="nofollow">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It&#39;s using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there&#39;s virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You&#39;ll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you&#39;re interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" rel="nofollow">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he&#39;s just committed</li>
<li>The ixl(4) driver, that&#39;s one for the X1710 40-gigabit card, now has netmap support</li>
<li>It&#39;s currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" rel="nofollow">directors@openbsdfoundation.org</a></h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">The OpenBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150221222235" rel="nofollow">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There&#39;s apparently plans for &quot;dhclientng&quot; - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" rel="nofollow">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they&#39;d be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he&#39;s covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" rel="nofollow">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" rel="nofollow">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" rel="nofollow">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" rel="nofollow">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" rel="nofollow">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" rel="nofollow">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" rel="nofollow">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" rel="nofollow">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" rel="nofollow">with vi</a> and a few other topics</li>
<li>Everyone&#39;s gotta start somewhere and, with a little bit of initial direction, today&#39;s newbies could be tomorrow&#39;s developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" rel="nofollow">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" rel="nofollow">testing suite</a> for all the CPU architectures</li>
<li>They&#39;ve finally gotten the number of &quot;expected&quot; failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" rel="nofollow">published</a> on a special release engineering page, so you can have a look if you&#39;re interested</li>
<li>The rest of the post links to the &quot;top performers&quot; (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" rel="nofollow">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they&#39;ve switched the default firewall away from PF to FreeBSD&#39;s native IPFW firewall</li>
<li>Look forward to Kris wearing a &quot;keep calm and use IPFW&quot; shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21zerHI9P" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142454205416445&w=2" rel="nofollow">VCS flamebait</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" rel="nofollow">Hidden agenda</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We&#39;ve also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it&#39;s going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year&#39;s conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  &quot;birds of a feather&quot; gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That&#39;s not the <a href="https://twitter.com/bsdcan/status/570394627158773760" rel="nofollow">ideal balance</a> we&#39;d hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" rel="nofollow">BSDCan says</a> they&#39;ll try to improve that next year</li>
<li>Those numbers are based on the speaker&#39;s background, or any past presentations, for the few whose actual topic wasn&#39;t made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who&#39;s on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">a blog post</a> about the proposals and rejections this year</li>
<li>If you can&#39;t make it this year, don&#39;t worry, we&#39;ll be sure to announce the recordings when they&#39;re made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" rel="nofollow">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" rel="nofollow">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" rel="nofollow">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you&#39;re running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" rel="nofollow">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" rel="nofollow">just that</a></li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&m=135887624714548&w=2" rel="nofollow">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" rel="nofollow">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It&#39;s now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called &quot;opnsense-update&quot; (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" rel="nofollow">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" rel="nofollow">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they&#39;ve also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week&#39;s mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" rel="nofollow">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" rel="nofollow">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it&#39;s actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" rel="nofollow">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It&#39;s using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there&#39;s virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You&#39;ll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you&#39;re interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" rel="nofollow">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he&#39;s just committed</li>
<li>The ixl(4) driver, that&#39;s one for the X1710 40-gigabit card, now has netmap support</li>
<li>It&#39;s currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" rel="nofollow">directors@openbsdfoundation.org</a></h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">The OpenBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150221222235" rel="nofollow">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There&#39;s apparently plans for &quot;dhclientng&quot; - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" rel="nofollow">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they&#39;d be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he&#39;s covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" rel="nofollow">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" rel="nofollow">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" rel="nofollow">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" rel="nofollow">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" rel="nofollow">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" rel="nofollow">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" rel="nofollow">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" rel="nofollow">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" rel="nofollow">with vi</a> and a few other topics</li>
<li>Everyone&#39;s gotta start somewhere and, with a little bit of initial direction, today&#39;s newbies could be tomorrow&#39;s developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" rel="nofollow">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" rel="nofollow">testing suite</a> for all the CPU architectures</li>
<li>They&#39;ve finally gotten the number of &quot;expected&quot; failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" rel="nofollow">published</a> on a special release engineering page, so you can have a look if you&#39;re interested</li>
<li>The rest of the post links to the &quot;top performers&quot; (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" rel="nofollow">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they&#39;ve switched the default firewall away from PF to FreeBSD&#39;s native IPFW firewall</li>
<li>Look forward to Kris wearing a &quot;keep calm and use IPFW&quot; shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21zerHI9P" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142454205416445&w=2" rel="nofollow">VCS flamebait</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" rel="nofollow">Hidden agenda</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>15: Kickin' NAS</title>
  <link>https://www.bsdnow.tv/15</link>
  <guid isPermaLink="false">cbf73b1a-fa1e-4acd-a1c4-ad96edb36916</guid>
  <pubDate>Wed, 11 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf73b1a-fa1e-4acd-a1c4-ad96edb36916.mp3" length="77923925" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:48:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
More faces of FreeBSD (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html)
Another installment of the FoF series
This time they talk with Reid Linnemann who works at Spectra Logic
Gives a history of all the different jobs he's done, all the programming languages he knows
Mentions how he first learned about FreeBSD, actually pretty similar to Kris' story
"I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD."
Now works on FreeBSD as his day job
The second one (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html) covers Brooks Davis
FreeBSD committer since 2001 and core team member from 2006 through 2012
He's helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain
"One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it."
Lots more in the show notes
***
We cannot trust Intel and Via’s chip-based crypto (https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security)
We woke up to see FreeBSD on the front page of The Register (http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/), Ars Technica (http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/), Slashdot (http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption) and Hacker News (https://news.ycombinator.com/item?id=6880474) for their strong stance on security and respecting privacy
At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.
FreeBSD's /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA's hardware RNGs as the sole point of entropy
"It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more"
***
OpenSMTPD 5.4.1 released (http://article.gmane.org/gmane.mail.opensmtpd.general/1146)
The OpenBSD developers came out with major a new version
Improved config syntax (please check your smtpd.conf before upgrading)
Adds support for TLS Perfect Forward Secrecy and custom CA certificate
MTA, Queue and SMTP server improvements
SNI support confirmed for the next version
Check the show notes for the full list of changes, pretty huge release
Watch Episode 3 (http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx) for an interview we did with the developers
***
More getting to know your portmgr (http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/)
The portmgr secretary, Thomas Abthorpe, interviews... himself!
Joined as -secretary in March 2010, upgraded to full member in March 2011
His inspiration for using BSD is "I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go."
Mentions how he loves that anyone can contribute and watch it "go live"
The second one (http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/) covers Baptiste Daroussin
The reason for his nick, bapt, is "Baptiste is too long to type"
There's even a video (https://www.youtube.com/watch?v=tZk__K8rqOg) of bapt joining the team!
***
Interview - Santa Clause - josh@ixsystems.com (mailto:josh@ixsystems.com) / @freenasteam (https://twitter.com/freenasteam)
FreeNAS 9.2.0 (http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html)
Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.
Tutorial
FreeNAS walkthrough
News Roundup
Introducing configinit (http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html)
CloudInit is "a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2"
Wasn't ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)
Colin Percival came up with configinit, a FreeBSD alternative
Alongside his new "firstboot-pkgs" port, it can spin up a webserver in 120 seconds from "launch" of the EC2 instance
Check the show notes for full blog post
***
OpenSSH support for Ed25519 and bcrypt keys (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup)
New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code
SSH private keys were encrypted with a symmetric key that's just an MD5 of their password
Now they'll be using bcrypt by default (http://marc.info/?l=openbsd-cvs&amp;amp;m=138633721618361&amp;amp;w=2)
We'll get more into this in next week's interview
***
The FreeBSD challenge (http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/)
A member of the Linux foundation blogs about using FreeBSD
Goes through all the beginner steps, has to "unlearn" some of his Linux ways
Only a few posts as of this time, but it's a continuing series that may be helpful for switchers
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/)
GNOME3, cinnamon and mate desktops are in the installer
Compat layer updated to CentOS 6, enables newest Skype
Looking for people to test printers and hplip
Continuing work on grub, but the ability to switch between bootloaders is back
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s20k2gumbP)
Jason writes in (http://slexy.org/view/s2PM8tfKfe)
John writes in (http://slexy.org/view/s2KgXIKqrJ)
Kjell-Aleksander writes in (http://slexy.org/view/s20DLk8bac)
Alexy writes in (http://slexy.org/view/s2nmmJHvgR)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, freenas, ixsystems, nas, network attached storage, josh paetzel, jpaetzel, cto, zfs, zpool, encryption, 9.2.0, walkthrough, web, interface, ui, frontend, opensmtpd, bcrypt, openssh, portmgr, linux foundation, switching from linux to bsd, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
