<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 26 Apr 2026 22:37:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Lxc”</title>
    <link>https://www.bsdnow.tv/tags/lxc</link>
    <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>102: May Contain ZFS</title>
  <link>https://www.bsdnow.tv/102</link>
  <guid isPermaLink="false">e0de53ca-3dcf-4df7-a556-faa52c7788a7</guid>
  <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0de53ca-3dcf-4df7-a556-faa52c7788a7.mp3" length="48985492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD on Olimex RT5350F-OLinuXino (https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino)
If you haven't heard of the RT5350F-OLinuXino-EVB, you're not alone (actually, we probably couldn't even remember the name if we did know about it)
It's a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM
This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment
In part two of the series (https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2), he talks about the GPIO and how you can configure it
Part three is still in the works, so check the site later on for further progress and info
***
The modern OpenBSD home router (https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html)
In a new series of blog posts, one guy takes you through the process of building an OpenBSD-based gateway (http://www.bsdnow.tv/tutorials/openbsd-router) for his home network
"It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst"
Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless
This guide also covers PPP and IPv6, in case you have those requirements
In a similar but unrelated series (http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html), another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge
He also has a separate post (http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html) for setting up an IPSEC VPN on the router
***
NetBSD at Open Source Conference 2015 Kansai (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html)
The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference
They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event
Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k
They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it
And what conference would be complete without an LED-powered towel
***
OpenSSH 7.0 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html)
The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code
SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled
The syntax for permitting root logins has been changed, and is now called "prohibit-password" instead of "without-password" (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now
If you're using an older configuration file, the "without-password" option still works, so no change is required
You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications
Various bug fixes and documentation improvements are also included
Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users
In the next release, even more deprecation is planned: RSA keys will be refused if they're under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***
Interview - Peter Toth - peter.toth198@gmail.com (mailto:peter.toth198@gmail.com) / @pannonp (https://twitter.com/pannonp)
Containment with iocage (https://github.com/iocage/iocage)
News Roundup
More c2k15 reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809105132)
A few more hackathon reports from c2k15 in Calgary are still slowly trickling in
Alexander Bluhm's up first, and he continued improving OpenBSD's regression test suite (this ensures that no changes accidentally break existing things)
He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging
Renato Westphal sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150811171006) of his very first hackathon
He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network
Philip Guenther also wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809165912), getting some very technical and low-level stuff done at the hackathon
His report opens with "First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking." - not exactly beginner stuff
There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***
FreeBSD jails, the hard way (https://clinta.github.io/freebsd-jails-the-hard-way)
As you learned from our interview this week, there's quite a selection of tools available to manage your jails
This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf
Unlike with iocage, ZFS isn't actually a requirement for this method
If you are using it, though, you can make use of snapshots for making template jails
***
OpenSSH hardware tokens (http://www.tancsa.com/mdtblog/?p=73)
We've talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client and server?
This blog post will show you how to use a hardware token as a second authentication factor, for the "something you know, something you have" security model
It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd
Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***
LibreSSL 2.2.2 released (http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt)
The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes
At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don't want in a crypto tool...) and much more
SSLv3 support was removed from the "openssl" command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it'll be removed completely
Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc
It'll be in 5.8 (due out earlier than usual) and it's in the FreeBSD ports tree as well
***
Feedback/Questions
James writes in (http://slexy.org/view/s216lrsVVd)
Stuart writes in (http://slexy.org/view/s20uGUHWLr)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jails, iocage, bhyve, containers, lxc, docker, ezjail, router, gateway, ipsec, vpn, libressl, authentication, uefi, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
