<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 16:55:14 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Md5”</title>
    <link>https://www.bsdnow.tv/tags/md5</link>
    <pubDate>Wed, 26 Aug 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>104: Beverly Hills 25519</title>
  <link>https://www.bsdnow.tv/104</link>
  <guid isPermaLink="false">0bc0c068-36fe-429f-b7f4-38ac01fb7f19</guid>
  <pubDate>Wed, 26 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0bc0c068-36fe-429f-b7f4-38ac01fb7f19.mp3" length="58136116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</itunes:subtitle>
  <itunes:duration>1:20:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
EdgeRouter Lite, meet OpenBSD (http://www.tedunangst.com/flak/post/OpenBSD-on-ERL)
The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it 
We've covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)
Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it
He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware
More discussion can be found on Hacker News (https://news.ycombinator.com/item?id=10079210) and various (https://www.reddit.com/r/openbsd/comments/3hgf2c) other (https://www.marc.info/?t=143974140500001&amp;amp;r=1&amp;amp;w=2) places (https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite)
One thing to note (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143991822827285&amp;amp;w=2) about these devices: because of their MIPS64 processor, they'll have weaker ASLR than X86 CPUs (and no W^X at all)
***
Design and Implementation of the FreeBSD Operating System interview (http://www.infoq.com/articles/freebsd-design-implementation-review)
For those who don't know, the "Design and Implementation of the FreeBSD Operating System" is a semi-recently-revived technical reference book for FreeBSD development
InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors
"The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points."
Aside from detailing a few of the chapters, the interview covers who the book's target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***
Path list parameter in OpenBSD tame (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144027474117290&amp;amp;w=2)
We've mentioned OpenBSD's relatively new "tame (https://marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2)" subsystem a couple times before: it's an easy-to-implement "self-containment" framework, allowing programs to have a reduced feature set mode with even less privileges
One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between
Now there's the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers
The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9
More discussion can be found on Reddit (https://www.reddit.com/r/openbsd/comments/3i2lk7) and Hacker News (https://news.ycombinator.com/item?id=10104886)
***
FreeBSD &amp;amp; PC-BSD 10.2-RELEASE (https://www.freebsd.org/releases/10.2R/announce.html)
The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out
The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13
New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to
A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet
The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions
ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards
The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups
In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail
Check the full release notes (https://www.freebsd.org/releases/10.2R/relnotes.html) for the rest of the details and changes
PC-BSD also followed with their 10.2-RELEASE (http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available), sporting a few more additional features
***
Interview - Damien Miller - djm@openbsd.org (mailto:djm@openbsd.org) / @damienmiller (https://twitter.com/damienmiller)
OpenSSH: phasing out broken crypto, default cipher changes
News Roundup
NetBSD at Open Source Conference Shimane (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html)
We weren't the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another
This time they had NetBSD running on some Sony NWS devices (MIPS-based)
JavaStations (https://en.wikipedia.org/wiki/JavaStation) were also on display - something we haven't ever seen before (made between 1996-2000)
***
BAFUG videos (https://www.youtube.com/watch?v=-XF20nitI90)
The Bay Area FreeBSD users group has been uploading some videos of their recent meetings
Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works
Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts
In a second video (https://www.youtube.com/watch?v=49sPYHh473U), Jordan Hubbard and Kip Macy introduce "NeXTBSD aka FreeBSD X"
In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)
People should record presentations at their BSD users groups and send them to us
***
L2TP over IPSEC on OpenBSD (http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients)
If you've got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well
Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic
This guide specifically covers L2TP, using npppd and pre-shared keys
Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***
Reliable bare metal with TrueOS (http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd)
Imagine a server version of PC-BSD with some useful utilities preinstalled - that's basically TrueOS
This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution
Most importantly, he also covers how to keep everything redundant and deal with hard drives failing
The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he'd like
Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***
Kernel W^X on i386 (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144047868127049&amp;amp;w=2)
We mentioned some big W^X kernel changes in OpenBSD a while back (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2), but the work was mainly for x86_64 CPU architecture (which makes sense; that's what most people run now)
Mike Larkin is back again, and isn't leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well
Check out our interview with Mike (http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction) for some more background info on memory protections like W^X
***
Feedback/Questions
Markus writes in (http://slexy.org/view/s2iGoeYMyb)
Sean writes in (http://slexy.org/view/s21bIFfmUS)
Theo writes in (http://slexy.org/view/s21Hjm8Tsa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssh, openssl, chacha20, chacha20-poly1305, aes, md5, hmac, cbc, gcm, cryptography, ed25519, curve25519, erl, edgerouter lite, tame, bafug</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>67: Must Be Rigged</title>
  <link>https://www.bsdnow.tv/67</link>
  <guid isPermaLink="false">5e135afe-0a75-46d6-b995-ae5d3ca228ba</guid>
  <pubDate>Wed, 10 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5e135afe-0a75-46d6-b995-ae5d3ca228ba.mp3" length="58310356" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Bitrig 1.0 released (http://article.gmane.org/gmane.os.bitrig.devel/6)
If you haven't heard of it, Bitrig (https://www.bitrig.org/) is a fork of OpenBSD that started a couple years ago
According to their FAQ (https://github.com/bitrig/bitrig/wiki/Faq), some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support
They've finally announced their first official release, 1.0
This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version
It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background
One of the developers answered some questions (https://news.ycombinator.com/item?id=8701936) about it on Hacker News too
***
Is it time to try BSD? (http://www.technewsworld.com/story/81424.html)
Here we get a little peek into the Linux world - more and more people are considering switching
On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD
People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side
This article explores some pros and cons of switching, and features opinions of various users
***
Poudriere 3.1 released (https://github.com/freebsd/poudriere/wiki/release_notes_31)
One of the first things we ever covered on the show was poudriere (http://www.bsdnow.tv/tutorials/poudriere), a tool with a funny name that's used to build binary packages from FreeBSD ports
It's come a long way since then, and bdrewery (http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry) and bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries) have just announced a new major version
This new release features a redesigned web interface to check on the status of your packages
There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier
It also introduces a useful new "pkgclean" subcommand to clean out your repository of packages that aren't needed anymore, and poudriere keeps it cleaner by default as well now
Check the full release notes for all the additions and bug fixes
***
Firewalling with OpenBSD's pf and pfsync (https://www.youtube.com/watch?v=mN5E2EYJnrw)
A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync
He uses pf to manage 60 internal networks with a single firewall
The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated
It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more
The second half of the presentation focuses on pfsync and carp for failover and redundancy
With two BSD boxes running pfsync, you can actually patch your kernel and still stay connected to IRC
***
Interview - Patrick Wildt - patrick@bitrig.org (mailto:patrick@bitrig.org) / @bitrig (https://twitter.com/bitrig)
The initial release of Bitrig
News Roundup
Infrastructural enhancements at NYI (http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html)
The FreeBSD foundation put up a new blog post detailing some hardware improvements they've recently done
Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things
There've been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there
This blog post goes into detail about how those servers are used and details some of the network topology
***
The long tail of MD5 (http://www.tedunangst.com/flak/post/the-long-tail-of-MD5)
Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD's tree with something more modern
In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace
Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect
Some other places (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141763065223567&amp;amp;w=4) require a bit more care… 
***
DragonFly cheat sheet (http://www.dragonflybsd.org/varialus/)
If you've been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier
A user-created "cheat sheet" on the website lists some common answers to beginner questions
The page features a walkthrough of the installer, some shell tips and workarounds for various issues
At the end, it also has some things that new users can get involved with to help out
***
Experiences with an OpenBSD laptop (http://alxjsn.com/unix/openbsd-laptop/)
A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that
The author got interested in OpenBSD mostly because of the security focus and the fact that it's not Linux
In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad
He even gives us a mention as a good place to learn more about BSD, thanks!
***
PC-BSD Updates (http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html)
A call for testing of a new update system has gone out
Conversion to Qt5 for utils has taken place
***
Feedback/Questions
Chris writes in (http://slexy.org/view/s2ihSmjpLu)
AJ writes in (http://slexy.org/view/s20JXhXS6o)
Dan writes in (http://slexy.org/view/s21hfeWB2K)
Jeff writes in (http://slexy.org/view/s2k6SmuDGB)
***
Mailing List Gold
Over 440% faster (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141775233603723&amp;amp;w=2)
The (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html) PF (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html) conundrum (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html) (edit: Allan misspoke about PF performance during this segment, apologies.)
Violating (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141807513728073&amp;amp;w=4) bad standards (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2)
apt-get rid of systemd (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141798194330985&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bitrig, fork, clang, llvm, virtualization, poudriere, srand, random, md5, sha512, rand, srand, systemd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>16: Cryptocrystalline</title>
  <link>https://www.bsdnow.tv/16</link>
  <guid isPermaLink="false">d9af27cf-c4ff-4572-b119-cbfd0e4167c8</guid>
  <pubDate>Wed, 18 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9af27cf-c4ff-4572-b119-cbfd0e4167c8.mp3" length="79454910" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:50:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Secure communications with OpenBSD and OpenVPN (http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/)
Starting off today's theme of encryption...
A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic
Part 1 covers installing OpenBSD with full disk encryption (which we'll be doing later on in the show)
Part 2 covers the initial setup of OpenVPN certificates and keys
Parts 3 and 4 are the OpenVPN server and client configuration
Part 5 is some updates and closing remarks
***
FreeBSD Foundation Newsletter (https://www.freebsdfoundation.org/press/2013Dec-newsletter)
The December 2013 semi-annual newsletter was sent out from the foundation
In the newsletter you will find the president's letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored
The president's letter alone is worth the read, really amazing
Really long, with lots of details and stories from the conferences and projects
***
Use of NetBSD with Marvell Kirkwood Processors (http://evertiq.com/design/33394)
Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer
The IP-Plug is a "multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger)."
Really cool little NetBSD ARM project with lots of graphs, pictures and details
***
Experimenting with zero-copy network IO (http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html)
Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD
Discusses the different OS' implementations and options
He's able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn't stopping there
Tons of details, check the full post
***
Interview - Damien Miller - djm@openbsd.org (mailto:djm@openbsd.org) / @damienmiller (https://twitter.com/damienmiller)
Cryptography in OpenBSD and OpenSSH
Tutorial
Full disk encryption in FreeBSD &amp;amp; OpenBSD (http://www.bsdnow.tv/tutorials/fde)
News Roundup
OpenZFS office hours (https://www.youtube.com/watch?v=wWmVW2R_uz8)
Our buddy George Wilson (http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days) sat down to take some ZFS questions from the community
You can see more info about it here (http://open-zfs.org/wiki/OpenZFS_Office_Hours)
***
License summaries in pkgng (http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html)
A discussion between Justin Sherill (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) and some NYCBUG guys about license frameworks in pkgng
Similar to pkgsrc's "ACCEPTABLE_LICENSES" setting, pkgng could let the user decide which software licenses he wants to allow
Maybe we could get a "pkg licenses" command to display the license of all installed packages
Ok bapt, do it
***
The FreeBSD challenge continues (http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/)
Checking in with our buddy from the Linux foundation...
The switching from Linux to FreeBSD blog series continues for his month-long trial
Follow up from last week: "As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding."
Since we last mentioned it, he's decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***
Ports gets a stable branch (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=336615)
For the first time ever, FreeBSD's ports tree will have a maintained "stable" branch
This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes
All commits to this branch require approval of portmgr, looks like it'll start in 2014Q1
***
Feedback/Questions
John writes in (http://slexy.org/view/s2iRV1tOzB)
Spencer writes in (http://slexy.org/view/s21gAR5lgf)
Campbell writes in (http://slexy.org/view/s203iOnFh1)
Sha'ul writes in (http://slexy.org/view/s2yUqj3vKW)
Clint writes in (http://slexy.org/view/s2egcTPBXH)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, arm, openssh, sftp, security, damien miller, djm, mindrot, encryption, crypto, chacha20, poly1305, aes, hmac, mac, sha256, cipher, rc4, base64, encode, decode, ed25519, bcrypt, md5, hash, salt, openzfs, office hours, openvpn, vps, vpn, ssl, tun, tap, foundation, newsletter, freebsd journal, ixsystems, ecc, rsa, dsa, ecdsa, tunnel, keys, password, passphrase, full disk encryption, fde, installation, encrypted install, unencrypted</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
