<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 03 May 2026 18:32:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Midnightbsd”</title>
    <link>https://www.bsdnow.tv/tags/midnightbsd</link>
    <pubDate>Thu, 25 Jan 2024 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>543: OpenBSD Workstation Hardening</title>
  <link>https://www.bsdnow.tv/543</link>
  <guid isPermaLink="false">caf89436-cf84-432e-a1cd-a88fc3385198</guid>
  <pubDate>Thu, 25 Jan 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/caf89436-cf84-432e-a1cd-a88fc3385198.mp3" length="56984832" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</itunes:subtitle>
  <itunes:duration>59:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/" target="_blank" rel="nofollow noopener"&gt;OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/" target="_blank" rel="nofollow noopener"&gt;2023 in Review: Continuous Integration and Workflow Improvement&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/" target="_blank" rel="nofollow noopener"&gt;Running OpenBSD on OmniOS using bhyve&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/" target="_blank" rel="nofollow noopener"&gt;FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://dataswamp.org/%7Esolene/2023-12-31-hardened-openbsd-workstation.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD workstation hardening&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://www.undeadly.org/cgi?action=article;sid=20231227120851&amp;amp;utm_source=bsdweekly" target="_blank" rel="nofollow noopener"&gt;KDE Plasma now linked to packages build on -current&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 3.1.3 release&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md" target="_blank" rel="nofollow noopener"&gt;Kieran - Feedback&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md" target="_blank" rel="nofollow noopener"&gt;Albin - links inquires questions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, best practices, databases, vm, virtual machine, review 2023, continuous integration, workflow improvement, omnios, bhyve, jailed datasets, workstation, hardening, KDE plasma, midnightbsd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/" rel="nofollow">2023 in Review: Continuous Integration and Workflow Improvement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/" rel="nofollow">Running OpenBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/" rel="nofollow">FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2023-12-31-hardened-openbsd-workstation.html" rel="nofollow">OpenBSD workstation hardening</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20231227120851&utm_source=bsdweekly" rel="nofollow">KDE Plasma now linked to packages build on -current</a></p>

<hr>

<p><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release" rel="nofollow">MidnightBSD 3.1.3 release</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md" rel="nofollow">Kieran - Feedback</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md" rel="nofollow">Albin - links inquires questions</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/" rel="nofollow">2023 in Review: Continuous Integration and Workflow Improvement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/" rel="nofollow">Running OpenBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/" rel="nofollow">FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2023-12-31-hardened-openbsd-workstation.html" rel="nofollow">OpenBSD workstation hardening</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20231227120851&utm_source=bsdweekly" rel="nofollow">KDE Plasma now linked to packages build on -current</a></p>

<hr>

<p><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release" rel="nofollow">MidnightBSD 3.1.3 release</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md" rel="nofollow">Kieran - Feedback</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md" rel="nofollow">Albin - links inquires questions</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>504: Release the BSD</title>
  <link>https://www.bsdnow.tv/504</link>
  <guid isPermaLink="false">2d02bfb1-4e33-4be1-8424-a707ddbeac55</guid>
  <pubDate>Thu, 27 Apr 2023 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2d02bfb1-4e33-4be1-8424-a707ddbeac55.mp3" length="34665600" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</itunes:subtitle>
  <itunes:duration>36:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/13.2R/announce/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13.2 Release Announcement&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" target="_blank" rel="nofollow noopener"&gt;Using DTrace to find block sizes of ZFS, NFS, and iSCSI&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" target="_blank" rel="nofollow noopener"&gt;Midnight BSD 3.0.1&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" target="_blank" rel="nofollow noopener"&gt;Closing a stale SSH connection&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" target="_blank" rel="nofollow noopener"&gt;How to automatically add identity to the SSH authentication agent&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" target="_blank" rel="nofollow noopener"&gt;Dan - ZFS question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" target="_blank" rel="nofollow noopener"&gt;Matt - Thanks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, dtrace, nfs, iscsi, block size, midnightbsd, ssh, connection, identity, public key, authentication, agent, virtual server</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>429: Advanced ZFS Snapshots</title>
  <link>https://www.bsdnow.tv/429</link>
  <guid isPermaLink="false">1f4cdc97-493b-4460-a6c0-a334cc96ff50</guid>
  <pubDate>Thu, 18 Nov 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1f4cdc97-493b-4460-a6c0-a334cc96ff50.mp3" length="22911048" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Foundation October Fundraising Update, Advanced ZFS Snapshots, Full WireGuard setup with OpenBSD, MidnightBSD a Linux Alternative, FreeBSD Audio, Tuning Power Consumption on FreeBSD Laptops, Thoughts on Spelling Fixes, and more.</itunes:subtitle>
  <itunes:duration>39:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD Foundation October Fundraising Update, Advanced ZFS Snapshots, Full WireGuard setup with OpenBSD, MidnightBSD a Linux Alternative, FreeBSD Audio, Tuning Power Consumption on FreeBSD Laptops, Thoughts on Spelling Fixes, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://freebsdfoundation.org/blog/freebsd-foundation-october-2021-fundraising-update/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation October 2021 Fundraising Update&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/advanced-zfs-snapshots/" target="_blank" rel="nofollow noopener"&gt;Advanced ZFS Snapshots&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-10-09-openbsd-wireguard-exit.html" target="_blank" rel="nofollow noopener"&gt;Full WireGuard setup with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.makeuseof.com/midnightbsd-linux-desktop-alternative/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD a Linux Alternative&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://meka.rs/blog/2021/10/12/freebsd-audio/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Audio&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.neelc.org/posts/freebsd-speed-shift-laptop/" target="_blank" rel="nofollow noopener"&gt;Tuning Power Consumption on FreeBSD Laptops and Intel Speed Shift (6th Gen and Later)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://bsdimp.blogspot.com/2021/10/spelling-fixes-some-advice.html" target="_blank" rel="nofollow noopener"&gt;Some Thoughts on Spelling Fixes&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/Bens%20feedback%20to%20Benedicts%20feedback%20to%20Bens%20question%20about%20zpoolboy.md" target="_blank" rel="nofollow noopener"&gt;Bens feedback to Benedict's feedback to Bens question about zpoolboy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/hcddbz%20-%20Old%20Technical%20Books.md" target="_blank" rel="nofollow noopener"&gt;hcddbz - Old Technical Books&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/jason%20-%20a%20jails%20question.md" target="_blank" rel="nofollow noopener"&gt;jason - a jails question&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, foundation, fundraising, fundraiser, snapshots, zfs snapshots, wireguard setup, midnightbsd, freebsd audio, tuning power, power consumption, laptop power, spelling fixes, typos</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Foundation October Fundraising Update, Advanced ZFS Snapshots, Full WireGuard setup with OpenBSD, MidnightBSD a Linux Alternative, FreeBSD Audio, Tuning Power Consumption on FreeBSD Laptops, Thoughts on Spelling Fixes, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://freebsdfoundation.org/blog/freebsd-foundation-october-2021-fundraising-update/" rel="nofollow">FreeBSD Foundation October 2021 Fundraising Update</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/advanced-zfs-snapshots/" rel="nofollow">Advanced ZFS Snapshots</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-10-09-openbsd-wireguard-exit.html" rel="nofollow">Full WireGuard setup with OpenBSD</a></h3>

<hr>

<h3><a href="https://www.makeuseof.com/midnightbsd-linux-desktop-alternative/" rel="nofollow">MidnightBSD a Linux Alternative</a></h3>

<hr>

<h3><a href="https://meka.rs/blog/2021/10/12/freebsd-audio/" rel="nofollow">FreeBSD Audio</a></h3>

<hr>

<h3><a href="https://www.neelc.org/posts/freebsd-speed-shift-laptop/" rel="nofollow">Tuning Power Consumption on FreeBSD Laptops and Intel Speed Shift (6th Gen and Later)</a></h3>

<hr>

<h3><a href="http://bsdimp.blogspot.com/2021/10/spelling-fixes-some-advice.html" rel="nofollow">Some Thoughts on Spelling Fixes</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/Bens%20feedback%20to%20Benedicts%20feedback%20to%20Bens%20question%20about%20zpoolboy.md" rel="nofollow">Bens feedback to Benedict&#39;s feedback to Bens question about zpoolboy</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/hcddbz%20-%20Old%20Technical%20Books.md" rel="nofollow">hcddbz - Old Technical Books</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/jason%20-%20a%20jails%20question.md" rel="nofollow">jason - a jails question</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Foundation October Fundraising Update, Advanced ZFS Snapshots, Full WireGuard setup with OpenBSD, MidnightBSD a Linux Alternative, FreeBSD Audio, Tuning Power Consumption on FreeBSD Laptops, Thoughts on Spelling Fixes, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://freebsdfoundation.org/blog/freebsd-foundation-october-2021-fundraising-update/" rel="nofollow">FreeBSD Foundation October 2021 Fundraising Update</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/advanced-zfs-snapshots/" rel="nofollow">Advanced ZFS Snapshots</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-10-09-openbsd-wireguard-exit.html" rel="nofollow">Full WireGuard setup with OpenBSD</a></h3>

<hr>

<h3><a href="https://www.makeuseof.com/midnightbsd-linux-desktop-alternative/" rel="nofollow">MidnightBSD a Linux Alternative</a></h3>

<hr>

<h3><a href="https://meka.rs/blog/2021/10/12/freebsd-audio/" rel="nofollow">FreeBSD Audio</a></h3>

<hr>

<h3><a href="https://www.neelc.org/posts/freebsd-speed-shift-laptop/" rel="nofollow">Tuning Power Consumption on FreeBSD Laptops and Intel Speed Shift (6th Gen and Later)</a></h3>

<hr>

<h3><a href="http://bsdimp.blogspot.com/2021/10/spelling-fixes-some-advice.html" rel="nofollow">Some Thoughts on Spelling Fixes</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/Bens%20feedback%20to%20Benedicts%20feedback%20to%20Bens%20question%20about%20zpoolboy.md" rel="nofollow">Bens feedback to Benedict&#39;s feedback to Bens question about zpoolboy</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/hcddbz%20-%20Old%20Technical%20Books.md" rel="nofollow">hcddbz - Old Technical Books</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/429/feedback/jason%20-%20a%20jails%20question.md" rel="nofollow">jason - a jails question</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>425: Releases galore</title>
  <link>https://www.bsdnow.tv/425</link>
  <guid isPermaLink="false">af8c08aa-71ac-4c87-8145-6a672a9d7e5d</guid>
  <pubDate>Thu, 21 Oct 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/af8c08aa-71ac-4c87-8145-6a672a9d7e5d.mp3" length="25604952" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</itunes:subtitle>
  <itunes:duration>41:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/" target="_blank" rel="nofollow noopener"&gt;RISC-V: The New Architecture on the Block&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you want more RISC-V, check out &lt;a href="https://www.opensourcevoices.org/20" target="_blank" rel="nofollow noopener"&gt;JT's interview with Mark Himelstein the CTO of RISC-V International&lt;/a&gt;
***
### &lt;a href="https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the Vortex86DX CPU&lt;/a&gt;
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### &lt;a href="http://lumina-desktop.org/post/2021-10-05/" target="_blank" rel="nofollow noopener"&gt;Lumina 1.6.1&lt;/a&gt;
### &lt;a href="https://opnsense.org/opnsense-21-7-3-released/" target="_blank" rel="nofollow noopener"&gt;opnsense 21.7.3&lt;/a&gt;
### &lt;a href="https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl" target="_blank" rel="nofollow noopener"&gt;LibreSSL patches&lt;/a&gt;
### &lt;a href="https://marc.info/?l=openbsd-announce&amp;amp;m=163239274430211&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBGPD 7.2&lt;/a&gt;
### &lt;a href="https://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener"&gt;Midnight BSD 2.1.0&lt;/a&gt;
### &lt;a href="http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available" target="_blank" rel="nofollow noopener"&gt;GhostBSD 21.09 ISO&lt;/a&gt;
### &lt;a href="https://github.com/helloSystem/ISO/releases/tag/r0.6.0" target="_blank" rel="nofollow noopener"&gt;helloSystemv0.6&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md" target="_blank" rel="nofollow noopener"&gt;Brandon - FreeBSD question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md" target="_blank" rel="nofollow noopener"&gt;Bruce - Fixing a weird Apache Bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md" target="_blank" rel="nofollow noopener"&gt;Dan - zfs question&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords> freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, riscv, vortex86dx, lumina, opensense, libressl, patches, openbgpd, midnightbsd, ghostbsd, hello system</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/" rel="nofollow">RISC-V: The New Architecture on the Block</a></h3>

<ul>
<li>If you want more RISC-V, check out <a href="https://www.opensourcevoices.org/20" rel="nofollow">JT&#39;s interview with Mark Himelstein the CTO of RISC-V International</a>
***
### <a href="https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/" rel="nofollow">OpenBSD on the Vortex86DX CPU</a>
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### <a href="http://lumina-desktop.org/post/2021-10-05/" rel="nofollow">Lumina 1.6.1</a>
### <a href="https://opnsense.org/opnsense-21-7-3-released/" rel="nofollow">opnsense 21.7.3</a>
### <a href="https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl" rel="nofollow">LibreSSL patches</a>
### <a href="https://marc.info/?l=openbsd-announce&m=163239274430211&w=2" rel="nofollow">OpenBGPD 7.2</a>
### <a href="https://www.midnightbsd.org/notes/" rel="nofollow">Midnight BSD 2.1.0</a>
### <a href="http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available" rel="nofollow">GhostBSD 21.09 ISO</a>
### <a href="https://github.com/helloSystem/ISO/releases/tag/r0.6.0" rel="nofollow">helloSystemv0.6</a></li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md" rel="nofollow">Brandon - FreeBSD question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md" rel="nofollow">Bruce - Fixing a weird Apache Bug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md" rel="nofollow">Dan - zfs question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The New Architecture on the Block, OpenBSD on Vortex86DX CPU, lots of new releases, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/risc-v-the-new-architecture-on-the-block/" rel="nofollow">RISC-V: The New Architecture on the Block</a></h3>

<ul>
<li>If you want more RISC-V, check out <a href="https://www.opensourcevoices.org/20" rel="nofollow">JT&#39;s interview with Mark Himelstein the CTO of RISC-V International</a>
***
### <a href="https://www.cambus.net/openbsd-on-the-vortex86dx-cpu/" rel="nofollow">OpenBSD on the Vortex86DX CPU</a>
***
## News Roundup aka there’s been lots of releases recently so lets go through them:
### <a href="http://lumina-desktop.org/post/2021-10-05/" rel="nofollow">Lumina 1.6.1</a>
### <a href="https://opnsense.org/opnsense-21-7-3-released/" rel="nofollow">opnsense 21.7.3</a>
### <a href="https://bsdsec.net/articles/openbsd-errata-september-27-2021-libressl" rel="nofollow">LibreSSL patches</a>
### <a href="https://marc.info/?l=openbsd-announce&m=163239274430211&w=2" rel="nofollow">OpenBGPD 7.2</a>
### <a href="https://www.midnightbsd.org/notes/" rel="nofollow">Midnight BSD 2.1.0</a>
### <a href="http://ghostbsd.org/ghostbsd_21.09.29_iso_now_available" rel="nofollow">GhostBSD 21.09 ISO</a>
### <a href="https://github.com/helloSystem/ISO/releases/tag/r0.6.0" rel="nofollow">helloSystemv0.6</a></li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Brandon%20-%20FreeBSD%20question.md" rel="nofollow">Brandon - FreeBSD question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Bruce%20-%20Fixing%20a%20weird%20Apache%20Bug.md" rel="nofollow">Bruce - Fixing a weird Apache Bug</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/425/feedback/Dan%20-%20zfs%20question.md" rel="nofollow">Dan - zfs question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>395: Tracing ARM’s history</title>
  <link>https://www.bsdnow.tv/395</link>
  <guid isPermaLink="false">9e4b924f-7f9c-49b4-81b7-b28ade7904b3</guid>
  <pubDate>Thu, 25 Mar 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9e4b924f-7f9c-49b4-81b7-b28ade7904b3.mp3" length="23944248" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Tracing the History of ARM and FreeBSD, Make ‘less’ more friendly, NomadBSD 1.4 Release, Create an Ubuntu Linux jail on FreeBSD 12.2, OPNsense 21.1.2 released, Midnight BSD and BastilleBSD, and more.</itunes:subtitle>
  <itunes:duration>37:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Tracing the History of ARM and FreeBSD, Make ‘less’ more friendly, NomadBSD 1.4 Release, Create an Ubuntu Linux jail on FreeBSD 12.2, OPNsense 21.1.2 released, Midnight BSD and BastilleBSD, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/tracing-the-history-of-arm-and-freebsd/" target="_blank" rel="nofollow noopener"&gt;Tracing the History of ARM and FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; When we think of computers, we generally think of laptops and desktops. Each one of these systems is powered by an Intel or AMD chip based on the x86 architecture. It might feel like you spend all day interacting with these kinds of systems, but you would be wrong.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://ascending.wordpress.com/2011/02/11/unix-tip-make-less-more-friendly/" target="_blank" rel="nofollow noopener"&gt;Unix Tip: Make ‘less’ more friendly&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; You probably know about less: it is a standard tool that allows scrolling up and down in documents that do not fit on a single screen. Less has a very handy feature, which can be turned on by invoking it with the -i flag. This causes less to ignore case when searching. For example, ‘udf’ will find ‘udf’, ‘UDF’, ‘UdF’, and any other combination of upper-case and lower-case. If you’re used to searching in a web browser, this is probably what you want. But less is even more clever than that. If your search pattern contains upper-case letters, the ignore-case feature will be disabled. So if you’re looking for ‘QXml’, you will not be bothered by matches for the lower-case ‘qxml’. (This is equivalent to ignorecase + smartcase in vim.)&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.itsfoss.net/nomadbsd-1-4-release/" target="_blank" rel="nofollow noopener"&gt;NomadBSD 1.4 Release&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Version 1.4 of NomadBSD, a persistent live system for USB flash drives based on FreeBSD and featuring a graphical user interface built around Openbox, has been released: “We are pleased to present the release of NomadBSD 1.4.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://hackacad.net/post/2021-01-23-create-a-ubuntu-linux-jail-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Create an Ubuntu Linux jail on FreeBSD 12.2&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-21-1-2-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 21.1.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Work has so far been focused on the firmware update process to ensure its safety around edge cases and recovery methods for the worst case. To that end 21.1.3 will likely receive the full revamp including API and GUI changes for a swift transition after thorough testing of the changes now available in the development package of this release.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.justjournal.com/users/mbsd/entry/33869" target="_blank" rel="nofollow noopener"&gt;Midnight BSD and BastilleBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; We recently added a new port, mports/sysutils/bastille that allows you to manage containers. This is a port of a project that originally targetted FreeBSD, but also works on HardenedBSD. &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Brad%20-%20monitoring%20with%20Grafana" target="_blank" rel="nofollow noopener"&gt;Brad - monitoring with Grafana&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Dennis%20-%20a%20few%20questions" target="_blank" rel="nofollow noopener"&gt;Dennis - a few questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Paul%20-%20FreeBSD%2013" target="_blank" rel="nofollow noopener"&gt;Paul - FreeBSD 13&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, arm, tracing, nomadbsd, Ubuntu jail, Linux jail, opnsense, midnightbsd, bastillebsd </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tracing the History of ARM and FreeBSD, Make ‘less’ more friendly, NomadBSD 1.4 Release, Create an Ubuntu Linux jail on FreeBSD 12.2, OPNsense 21.1.2 released, Midnight BSD and BastilleBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/tracing-the-history-of-arm-and-freebsd/" rel="nofollow">Tracing the History of ARM and FreeBSD</a></h3>

<blockquote>
<p>When we think of computers, we generally think of laptops and desktops. Each one of these systems is powered by an Intel or AMD chip based on the x86 architecture. It might feel like you spend all day interacting with these kinds of systems, but you would be wrong.</p>

<hr>

<h3><a href="https://ascending.wordpress.com/2011/02/11/unix-tip-make-less-more-friendly/" rel="nofollow">Unix Tip: Make ‘less’ more friendly</a></h3>

<p>You probably know about less: it is a standard tool that allows scrolling up and down in documents that do not fit on a single screen. Less has a very handy feature, which can be turned on by invoking it with the -i flag. This causes less to ignore case when searching. For example, ‘udf’ will find ‘udf’, ‘UDF’, ‘UdF’, and any other combination of upper-case and lower-case. If you’re used to searching in a web browser, this is probably what you want. But less is even more clever than that. If your search pattern contains upper-case letters, the ignore-case feature will be disabled. So if you’re looking for ‘QXml’, you will not be bothered by matches for the lower-case ‘qxml’. (This is equivalent to ignorecase + smartcase in vim.)</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.itsfoss.net/nomadbsd-1-4-release/" rel="nofollow">NomadBSD 1.4 Release</a></h3>

<blockquote>
<p>Version 1.4 of NomadBSD, a persistent live system for USB flash drives based on FreeBSD and featuring a graphical user interface built around Openbox, has been released: “We are pleased to present the release of NomadBSD 1.4.</p>

<hr>

<h3><a href="https://hackacad.net/post/2021-01-23-create-a-ubuntu-linux-jail-on-freebsd/" rel="nofollow">Create an Ubuntu Linux jail on FreeBSD 12.2</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-21-1-2-released/" rel="nofollow">OPNsense 21.1.2 released</a></h3>

<p>Work has so far been focused on the firmware update process to ensure its safety around edge cases and recovery methods for the worst case. To that end 21.1.3 will likely receive the full revamp including API and GUI changes for a swift transition after thorough testing of the changes now available in the development package of this release.</p>

<hr>

<h3><a href="https://www.justjournal.com/users/mbsd/entry/33869" rel="nofollow">Midnight BSD and BastilleBSD</a></h3>

<p>We recently added a new port, mports/sysutils/bastille that allows you to manage containers. This is a port of a project that originally targetted FreeBSD, but also works on HardenedBSD. </p>

<hr>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Brad%20-%20monitoring%20with%20Grafana" rel="nofollow">Brad - monitoring with Grafana</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Dennis%20-%20a%20few%20questions" rel="nofollow">Dennis - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Paul%20-%20FreeBSD%2013" rel="nofollow">Paul - FreeBSD 13</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tracing the History of ARM and FreeBSD, Make ‘less’ more friendly, NomadBSD 1.4 Release, Create an Ubuntu Linux jail on FreeBSD 12.2, OPNsense 21.1.2 released, Midnight BSD and BastilleBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/tracing-the-history-of-arm-and-freebsd/" rel="nofollow">Tracing the History of ARM and FreeBSD</a></h3>

<blockquote>
<p>When we think of computers, we generally think of laptops and desktops. Each one of these systems is powered by an Intel or AMD chip based on the x86 architecture. It might feel like you spend all day interacting with these kinds of systems, but you would be wrong.</p>

<hr>

<h3><a href="https://ascending.wordpress.com/2011/02/11/unix-tip-make-less-more-friendly/" rel="nofollow">Unix Tip: Make ‘less’ more friendly</a></h3>

<p>You probably know about less: it is a standard tool that allows scrolling up and down in documents that do not fit on a single screen. Less has a very handy feature, which can be turned on by invoking it with the -i flag. This causes less to ignore case when searching. For example, ‘udf’ will find ‘udf’, ‘UDF’, ‘UdF’, and any other combination of upper-case and lower-case. If you’re used to searching in a web browser, this is probably what you want. But less is even more clever than that. If your search pattern contains upper-case letters, the ignore-case feature will be disabled. So if you’re looking for ‘QXml’, you will not be bothered by matches for the lower-case ‘qxml’. (This is equivalent to ignorecase + smartcase in vim.)</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.itsfoss.net/nomadbsd-1-4-release/" rel="nofollow">NomadBSD 1.4 Release</a></h3>

<blockquote>
<p>Version 1.4 of NomadBSD, a persistent live system for USB flash drives based on FreeBSD and featuring a graphical user interface built around Openbox, has been released: “We are pleased to present the release of NomadBSD 1.4.</p>

<hr>

<h3><a href="https://hackacad.net/post/2021-01-23-create-a-ubuntu-linux-jail-on-freebsd/" rel="nofollow">Create an Ubuntu Linux jail on FreeBSD 12.2</a></h3>

<hr>

<h3><a href="https://opnsense.org/opnsense-21-1-2-released/" rel="nofollow">OPNsense 21.1.2 released</a></h3>

<p>Work has so far been focused on the firmware update process to ensure its safety around edge cases and recovery methods for the worst case. To that end 21.1.3 will likely receive the full revamp including API and GUI changes for a swift transition after thorough testing of the changes now available in the development package of this release.</p>

<hr>

<h3><a href="https://www.justjournal.com/users/mbsd/entry/33869" rel="nofollow">Midnight BSD and BastilleBSD</a></h3>

<p>We recently added a new port, mports/sysutils/bastille that allows you to manage containers. This is a port of a project that originally targetted FreeBSD, but also works on HardenedBSD. </p>

<hr>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Brad%20-%20monitoring%20with%20Grafana" rel="nofollow">Brad - monitoring with Grafana</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Dennis%20-%20a%20few%20questions" rel="nofollow">Dennis - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/395/feedback/Paul%20-%20FreeBSD%2013" rel="nofollow">Paul - FreeBSD 13</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>369: Where rc.d belongs</title>
  <link>https://www.bsdnow.tv/369</link>
  <guid isPermaLink="false">3594bb2c-b1c8-4f13-bcb9-6ad5094179a5</guid>
  <pubDate>Thu, 24 Sep 2020 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3594bb2c-b1c8-4f13-bcb9-6ad5094179a5.mp3" length="43421016" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated, Building the Development Version of Emacs on NetBSD, rc.d belongs in libexec, not etc, FreeBSD 11.3 EOL, OPNsense 20.7.1 Released, MidnightBSD 1.2.7 out, and more.</itunes:subtitle>
  <itunes:duration>44:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated, Building the Development Version of Emacs on NetBSD, rc.d belongs in libexec, not etc, FreeBSD 11.3 EOL, OPNsense 20.7.1 Released, MidnightBSD 1.2.7 out, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dzone.com/articles/high-availability-routerfirewall-using-openbsd-car" target="_blank" rel="nofollow noopener"&gt;High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I have been running OpenBSD on a Soekris net5501 for my router/firewall since early 2012. Because I run a multitude of services on this system (more on that later), the meager 500Mhz AMD Geode + 512MB SDRAM was starting to get a little sluggish while trying to do anything via the terminal. Despite the perceived performance hit during interactive SSH sessions, it still supported a full 100Mbit connection with NAT, so I wasn’t overly eager to change anything. Luckily though, my ISP increased the bandwidth available on my plan tier to 150Mbit+. Unfortunately, the Soekris only contained 4xVIA Rhine Fast Ethernet. So now, I was using a slow system and wasting money by not being able to fully utilize my connection.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lars.ingebrigtsen.no/2020/08/25/building-the-development-version-of-emacs-on-netbsd/" target="_blank" rel="nofollow noopener"&gt;Building the Development Version of Emacs on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I hadn’t really planned on installing a NetBSD VM (after doing all the other two BSDs), but then a NetBSD-related Emacs bug report arrived.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jmmv.dev/2020/08/rcd-libexec-etc.html" target="_blank" rel="nofollow noopener"&gt;rc.d belongs in libexec, not etc&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Let’s open with the controversy: the scripts that live under /etc/rc.d/ in FreeBSD, NetBSD, and OpenBSD are in the wrong place. They all should live in /libexec/rc.d/ because they are code, not configuration.&lt;br&gt;
&amp;gt; This misplacement is something that has bugged me for ages but I never had the energy to open this can of worms back when I was very involved in NetBSD. I suspect it would have been a draining discussion and a very difficult thing to change.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-September/001982.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11.3 EOL&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; As of September 30, 2020, FreeBSD 11.3 will reach end-of-life and will no longer&lt;br&gt;
be supported by the FreeBSD Security Team.  Users of FreeBSD 11.3 are strongly&lt;br&gt;
encouraged to upgrade to a newer release as soon as possible.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-20-7-1-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 20.7.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Overall, the jump to HardenedBSD 12.1 is looking promising from our end. From the reported issues we still have more logging quirks to investigate and especially Netmap support (used in IPS and Sensei) is lacking in some areas that were previously working. Patches are being worked on already so we shall get there soon enough.  Stay tuned.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.justjournal.com/users/mbsd/entry/33801" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 1.2.7 out&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; MidnightBSD 1.2.7 is available via the FTP/HTTP and mirrors as well as github.&lt;br&gt;&lt;br&gt;
&amp;gt; It includes several bug fixes and security updates over the last ISO release and is recommended for new installations.&lt;br&gt;&lt;br&gt;
&amp;gt; Users who don't want to updatee the whole OS, should consider at least updating libmport as there are many package management fixes&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.firosolutions.com/2020/08/tarsnap-podcast/" target="_blank" rel="nofollow noopener"&gt;Tarsnap podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://students.engr.scu.edu/%7Esschaeck/netbsd/index.html" target="_blank" rel="nofollow noopener"&gt;NetBSD Tips and Tricks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hackmd.io/hJgnfzd5TMK-VHgUzshA2g" target="_blank" rel="nofollow noopener"&gt;FreeBSD mini-git Primer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://ghostbsd.org/financial_reports_from_January_to_June_2020" target="_blank" rel="nofollow noopener"&gt;GhostBSD Financial Reports&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Daniel%20-%20Documentation%20Tooling.md" target="_blank" rel="nofollow noopener"&gt;Daniel - Documentation Tooling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Fongaboo%20-%20Where%20did%20the%20ZFS%20Tutorial%20Go.md" target="_blank" rel="nofollow noopener"&gt;Fongaboo - Where did the ZFS tutorial Go?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Johnny%20-%20Browser%20Cold%20Wars.md" target="_blank" rel="nofollow noopener"&gt;Johnny - Browser Cold Wars&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, berkeley, software, distribution, zfs, zpool, dataset, interview, ha, high availability, carp, pfsync, ifstated, development, emacs, rc.d, libexec, etc, end of life, release, opnsense, midnightbsd </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated, Building the Development Version of Emacs on NetBSD, rc.d belongs in libexec, not etc, FreeBSD 11.3 EOL, OPNsense 20.7.1 Released, MidnightBSD 1.2.7 out, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://dzone.com/articles/high-availability-routerfirewall-using-openbsd-car" rel="nofollow">High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated</a></h3>

<blockquote>
<p>I have been running OpenBSD on a Soekris net5501 for my router/firewall since early 2012. Because I run a multitude of services on this system (more on that later), the meager 500Mhz AMD Geode + 512MB SDRAM was starting to get a little sluggish while trying to do anything via the terminal. Despite the perceived performance hit during interactive SSH sessions, it still supported a full 100Mbit connection with NAT, so I wasn’t overly eager to change anything. Luckily though, my ISP increased the bandwidth available on my plan tier to 150Mbit+. Unfortunately, the Soekris only contained 4xVIA Rhine Fast Ethernet. So now, I was using a slow system and wasting money by not being able to fully utilize my connection.</p>
</blockquote>

<hr>

<h3><a href="https://lars.ingebrigtsen.no/2020/08/25/building-the-development-version-of-emacs-on-netbsd/" rel="nofollow">Building the Development Version of Emacs on NetBSD</a></h3>

<blockquote>
<p>I hadn’t really planned on installing a NetBSD VM (after doing all the other two BSDs), but then a NetBSD-related Emacs bug report arrived.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jmmv.dev/2020/08/rcd-libexec-etc.html" rel="nofollow">rc.d belongs in libexec, not etc</a></h3>

<blockquote>
<p>Let’s open with the controversy: the scripts that live under /etc/rc.d/ in FreeBSD, NetBSD, and OpenBSD are in the wrong place. They all should live in /libexec/rc.d/ because they are code, not configuration.<br>
This misplacement is something that has bugged me for ages but I never had the energy to open this can of worms back when I was very involved in NetBSD. I suspect it would have been a draining discussion and a very difficult thing to change.</p>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-September/001982.html" rel="nofollow">FreeBSD 11.3 EOL</a></h3>

<blockquote>
<p>As of September 30, 2020, FreeBSD 11.3 will reach end-of-life and will no longer<br>
be supported by the FreeBSD Security Team.  Users of FreeBSD 11.3 are strongly<br>
encouraged to upgrade to a newer release as soon as possible.</p>
</blockquote>

<hr>

<h3><a href="https://opnsense.org/opnsense-20-7-1-released/" rel="nofollow">OPNsense 20.7.1 Released</a></h3>

<blockquote>
<p>Overall, the jump to HardenedBSD 12.1 is looking promising from our end. From the reported issues we still have more logging quirks to investigate and especially Netmap support (used in IPS and Sensei) is lacking in some areas that were previously working. Patches are being worked on already so we shall get there soon enough.  Stay tuned.</p>
</blockquote>

<hr>

<h3><a href="https://www.justjournal.com/users/mbsd/entry/33801" rel="nofollow">MidnightBSD 1.2.7 out</a></h3>

<blockquote>
<p>MidnightBSD 1.2.7 is available via the FTP/HTTP and mirrors as well as github.<br><br>
It includes several bug fixes and security updates over the last ISO release and is recommended for new installations.<br><br>
Users who don&#39;t want to updatee the whole OS, should consider at least updating libmport as there are many package management fixes</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blog.firosolutions.com/2020/08/tarsnap-podcast/" rel="nofollow">Tarsnap podcast</a></li>
<li><a href="http://students.engr.scu.edu/%7Esschaeck/netbsd/index.html" rel="nofollow">NetBSD Tips and Tricks</a></li>
<li><a href="https://hackmd.io/hJgnfzd5TMK-VHgUzshA2g" rel="nofollow">FreeBSD mini-git Primer</a></li>
<li><a href="https://ghostbsd.org/financial_reports_from_January_to_June_2020" rel="nofollow">GhostBSD Financial Reports</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Daniel%20-%20Documentation%20Tooling.md" rel="nofollow">Daniel - Documentation Tooling</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Fongaboo%20-%20Where%20did%20the%20ZFS%20Tutorial%20Go.md" rel="nofollow">Fongaboo - Where did the ZFS tutorial Go?</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Johnny%20-%20Browser%20Cold%20Wars.md" rel="nofollow">Johnny - Browser Cold Wars</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated, Building the Development Version of Emacs on NetBSD, rc.d belongs in libexec, not etc, FreeBSD 11.3 EOL, OPNsense 20.7.1 Released, MidnightBSD 1.2.7 out, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://dzone.com/articles/high-availability-routerfirewall-using-openbsd-car" rel="nofollow">High Availability Router/Firewall Using OpenBSD, CARP, pfsync, and ifstated</a></h3>

<blockquote>
<p>I have been running OpenBSD on a Soekris net5501 for my router/firewall since early 2012. Because I run a multitude of services on this system (more on that later), the meager 500Mhz AMD Geode + 512MB SDRAM was starting to get a little sluggish while trying to do anything via the terminal. Despite the perceived performance hit during interactive SSH sessions, it still supported a full 100Mbit connection with NAT, so I wasn’t overly eager to change anything. Luckily though, my ISP increased the bandwidth available on my plan tier to 150Mbit+. Unfortunately, the Soekris only contained 4xVIA Rhine Fast Ethernet. So now, I was using a slow system and wasting money by not being able to fully utilize my connection.</p>
</blockquote>

<hr>

<h3><a href="https://lars.ingebrigtsen.no/2020/08/25/building-the-development-version-of-emacs-on-netbsd/" rel="nofollow">Building the Development Version of Emacs on NetBSD</a></h3>

<blockquote>
<p>I hadn’t really planned on installing a NetBSD VM (after doing all the other two BSDs), but then a NetBSD-related Emacs bug report arrived.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jmmv.dev/2020/08/rcd-libexec-etc.html" rel="nofollow">rc.d belongs in libexec, not etc</a></h3>

<blockquote>
<p>Let’s open with the controversy: the scripts that live under /etc/rc.d/ in FreeBSD, NetBSD, and OpenBSD are in the wrong place. They all should live in /libexec/rc.d/ because they are code, not configuration.<br>
This misplacement is something that has bugged me for ages but I never had the energy to open this can of worms back when I was very involved in NetBSD. I suspect it would have been a draining discussion and a very difficult thing to change.</p>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-September/001982.html" rel="nofollow">FreeBSD 11.3 EOL</a></h3>

<blockquote>
<p>As of September 30, 2020, FreeBSD 11.3 will reach end-of-life and will no longer<br>
be supported by the FreeBSD Security Team.  Users of FreeBSD 11.3 are strongly<br>
encouraged to upgrade to a newer release as soon as possible.</p>
</blockquote>

<hr>

<h3><a href="https://opnsense.org/opnsense-20-7-1-released/" rel="nofollow">OPNsense 20.7.1 Released</a></h3>

<blockquote>
<p>Overall, the jump to HardenedBSD 12.1 is looking promising from our end. From the reported issues we still have more logging quirks to investigate and especially Netmap support (used in IPS and Sensei) is lacking in some areas that were previously working. Patches are being worked on already so we shall get there soon enough.  Stay tuned.</p>
</blockquote>

<hr>

<h3><a href="https://www.justjournal.com/users/mbsd/entry/33801" rel="nofollow">MidnightBSD 1.2.7 out</a></h3>

<blockquote>
<p>MidnightBSD 1.2.7 is available via the FTP/HTTP and mirrors as well as github.<br><br>
It includes several bug fixes and security updates over the last ISO release and is recommended for new installations.<br><br>
Users who don&#39;t want to updatee the whole OS, should consider at least updating libmport as there are many package management fixes</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://blog.firosolutions.com/2020/08/tarsnap-podcast/" rel="nofollow">Tarsnap podcast</a></li>
<li><a href="http://students.engr.scu.edu/%7Esschaeck/netbsd/index.html" rel="nofollow">NetBSD Tips and Tricks</a></li>
<li><a href="https://hackmd.io/hJgnfzd5TMK-VHgUzshA2g" rel="nofollow">FreeBSD mini-git Primer</a></li>
<li><a href="https://ghostbsd.org/financial_reports_from_January_to_June_2020" rel="nofollow">GhostBSD Financial Reports</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Daniel%20-%20Documentation%20Tooling.md" rel="nofollow">Daniel - Documentation Tooling</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Fongaboo%20-%20Where%20did%20the%20ZFS%20Tutorial%20Go.md" rel="nofollow">Fongaboo - Where did the ZFS tutorial Go?</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/369/feedback/Johnny%20-%20Browser%20Cold%20Wars.md" rel="nofollow">Johnny - Browser Cold Wars</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 271: Automatic Drive Tests | BSD Now 271</title>
  <link>https://www.bsdnow.tv/271</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2867</guid>
  <pubDate>Thu, 08 Nov 2018 04:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/79038ba2-cb6e-4b71-8bcb-83141df434c3.mp3" length="40996081" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>MidnightBSD 1.0 released, MeetBSD review, EuroBSDcon trip reports, DNS over TLS in FreeBSD 12, Upgrading OpenBSD with Ansible, how to use smartd to run tests on your drives automatically, and more.</itunes:subtitle>
  <itunes:duration>1:08:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;MidnightBSD 1.0 released, MeetBSD review, EuroBSDcon trip reports, DNS over TLS in FreeBSD 12, Upgrading OpenBSD with Ansible, how to use smartd to run tests on your drives automatically, and more.&lt;/p&gt;

&lt;p&gt;##Headlines&lt;br&gt;
###&lt;a href="https://www.midnightbsd.org/news/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 1.0 now available&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I’m happy to announce the availability of MidnightBSD 1.0 for amd64 and i386. Over the years, many ambitious goals were set for our 1.0 release. As it approached, it was clear we wouldn’t be able to accomplish all of them. This release is more of a natural progression rather than a groundbreaking event. It includes many updates to the base system, improvements to the package manager, an updated compiler, and tools.&lt;br&gt;
Of particular note, you can now boot off of ZFS and use NVME SSDs and some AMD Radeon graphics cards support acceleration. AMD Ryzen support has greatly improved in this release. We also have added bhyve from FreeBSD.&lt;br&gt;
The 1.0 release is finally available. Still building packages for i386 and plan to do an amd64 package build later in the week. The single largest issue with the release process has been the web server performance. The CPU is overloaded and has been at solid 100% for several days. The server has a core i7 7700 in it. I’m trying to figure out what to buy as an upgrade so that we don’t continue to have this issue going forward. As it’s actually blocked in multiple processes, a 6 or 8 core chip might be an improvement for the workload…&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Download links: &lt;a href="https://www.midnightbsd.org/download/" target="_blank" rel="nofollow noopener"&gt;https://www.midnightbsd.org/download/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?time_continue=33&amp;amp;v=-rlk2wFsjJ4" target="_blank" rel="nofollow noopener"&gt;https://www.youtube.com/watch?time_continue=33&amp;amp;v=-rlk2wFsjJ4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://linuxunplugged.com/articles/meetbsd2018" target="_blank" rel="nofollow noopener"&gt;MeetBSD Review&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;MeetBSD 2018 took place at the sprawling Intel Santa Clara campus. The venue itself felt more like an olive branch than a simple friendly gesture by Intel. In truth it felt like a bit of an apology. You get the subtle sense they feel bad about how the BSD’s were treated with the Meltdown and Specter flaws. In fact, you may be right to think they felt a bit sorry towards the entire open source community.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;MeetBSD 2018&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;At most massive venues the parking is the first concern, not so here - in fact that was rather straightforward. No, the real challenge is navigating the buildings. Luckily I had help from navigator extraordinaire, Hadea, who located the correct building, SC12 quickly. Finding the entrance took a moment or two though. The lobby itself was converted by iXsystems efficiently into the MeetBSD expo hall, clean, efficient and roomy with registration, some seating, and an extra conference room for on-on-one sessions. On day two sponsor booths were also setup. All who showed up on day one were warmly greeted with badges, lanyards and goodies by Denise and her friendly team.&lt;br&gt;
Like every great BSD event, plenty of food was made available. And as always they make it look effortless. These events showcase iXsystem’s inherent generosity toward its community; with breakfast items in the back of the main auditorium room in the morning, boxed lunches, fruit and cookies at lunch time, and snacks for the rest of the day. But just in case your still hungry, there is a pizza meetup in another Intel room after day one and two.&lt;br&gt;
MeetBSD leverages it’s realistically small crowd size on day one. The morning starts off with introductions of the entire group, the mic is passed around the room.&lt;br&gt;
The group is a good mix of pros in the industry (such as Juniper, Intel, Ebay, Groupon, Cisco, etc), iX staff, and a few enthusiast. Lots of people with a focus or passion for networking. And, of course, some friendly Linux bashing went down for good measure, always followed by a good natured chuckle.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;MeetBSD Gives me The Feels&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;I find that I am subtly unnerved at this venue, and at lunch I saw it clearly. I have always had a strong geek radar, allowing me to navigate a new area (like Berkeley for MeetBSD of 2016, or even SCALE earlier this year in Pasadena), and in a glance I can see who is from my conference and who isn’t. This means it is easy, nearly effortless to know who to greet with a smile and a wave. These are MY people. Here at the Intel campus though it is different. The drive in alone reveals behemoth complexes all with well known tech names prominently displayed. This is Silicon Valley, and all of these people look like MY people. So much for knowing who’s from my conference. Thank goodness for those infamous BSD horns. None-the-less I am struck by how massive these tech giants are. And Intel is one of the largest of those giants, and see the physical reminders of this fact brought home the significance that they had opened their doors, wifi, and bathrooms to the BSD community.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###[EuroBSDcon 2018 Trip Reports]&lt;br&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/" target="_blank" rel="nofollow noopener"&gt;https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/" target="_blank" rel="nofollow noopener"&gt;https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/" target="_blank" rel="nofollow noopener"&gt;https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##News Roundup&lt;br&gt;
###&lt;a href="https://blog.des.no/2018/10/dns-over-tls-in-freebsd-12/" target="_blank" rel="nofollow noopener"&gt;DNS over TLS in FreeBSD 12&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;With the arrival of OpenSSL 1.1.1, an upgraded Unbound, and some changes to the setup and init scripts, FreeBSD 12.0, currently in beta, now supports DNS over TLS out of the box.&lt;br&gt;
DNS over TLS is just what it sounds like: DNS over TCP, but wrapped in a TLS session. It encrypts your requests and the server’s replies, and optionally allows you to verify the identity of the server. The advantages are protection against eavesdropping and manipulation of your DNS traffic; the drawbacks are a slight performance degradation and potential firewall traversal issues, as it runs over a non-standard port (TCP port 853) which may be blocked on some networks. Let’s take a look at how to set it up.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;We’ve seen how to set up Unbound—specifically, the local_unbound service in FreeBSD 12.0—to use DNS over TLS instead of plain UDP or TCP, using Cloudflare’s public DNS service as an example. We’ve looked at the performance impact, and at how to ensure (and verify) that Unbound validates the server certificate to prevent man-in-the-middle attacks.&lt;br&gt;
The question that remains is whether it is all worth it. There is undeniably a performance hit, though this may improve with TLS 1.3. More importantly, there are currently very few DNS-over-TLS providers—only one, really, since Quad9 filter their responses—and you have to weigh the advantage of encrypting your DNS traffic against the disadvantage of sending it all to a single organization. I can’t answer that question for you, but I can tell you that the parameters are evolving quickly, and if your answer is negative today, it may not remain so for long. More providers will appear. Performance will improve with TLS 1.3 and QUIC. Within a year or two, running DNS over TLS may very well become the rule rather than the experimental exception.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://chown.me/blog/upgrading-openbsd-with-ansible.html" target="_blank" rel="nofollow noopener"&gt;Upgrading OpenBSD with Ansible&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;My router runs OpenBSD -current&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;A few months ago, I needed software that had just hit the ports tree. I didn’t want to wait for the next release, so I upgraded my router to use -current. Since then, I’ve continued running -current, which means upgrading to a newer snapshot every so often. Running -current is great, but the process of updating to a newer snapshot was cumbersome. Initially, I had to plug in a serial cable and then reboot into bsd.rd, hit enter ten times, then reboot, run sysmerge and update packages.&lt;br&gt;
I eventually switched to upobsd to be able to upgrade without the need for a serial connection. The process was better, but still tiresome. Usually, I would prepare the special version of bsd.rd, boot on bsd.rd, and do something like wash the dishes in the meantime. After about ten minutes, I would dry my hands and then go back to my workstation to see whether the bsd.rd part had finished so I could run sysmerge and pkg_add, and then return to the dishes while it upgraded packages.&lt;br&gt;
Out of laziness, I thought: “I should automate this,” but what happened instead is that I simply didn’t upgrade that machine very often. (Yes, laziness). With my router out of commission, life is very dull, because it is my gateway to the Internet. Even services hosted at my place (like my Mastodon instance) are not reachable when the router is down because I use multiple VLANs (so I need the router to jump across VLANs).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Ansible Reboot Module&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;I recently got a new job, and one of my first tasks was auditing the Ansible roles written by my predecessors. In one role, the machine rebooted and they used the wait_for_connection module to wait for it to come back up. That sounded quite hackish to me, so out of curiosity, I tried to determine whether there was a better way. I also thought I might be able to use something similar to further automate my OpenBSD upgrades, and wanted to assess the cleanliness of this method. ;-)&lt;br&gt;
I learned that with the then-upcoming 2.7 Ansible release, a proper reboot module would be included. I went to the docs, which stated that for a certain parameter:&lt;br&gt;
I took this to mean that there was no support for OpenBSD. I looked at the code and, indeed, there was not. However, I believed that it wouldn’t be too hard to add it. I added the missing pieces for OpenBSD, tested it on my poor Pine64 and then submitted it upstream. After a quick back and forth, the module’s author merged it into devel (having a friend working at Red Hat helped the process, merci Cyril !) A couple days later, the release engineer merged it into stable-2.7.&lt;br&gt;
I proceeded to actually write the playbook, and then I hit a bug. The parameter reboot_timeout was not recognized by Ansible. This feature would definitely be useful on a slow machine (such as the Pine64 and its dying SD card). Again, my fix was merged into master by the module’s author and then merged into stable-2.7. 2.7.1 will be the first release to feature these fixes, but if you use OpenBSD -current, you already have access to them. I backported the patches when I updated ansible.&lt;br&gt;
Fun fact about Ansible and reboots: “The win_reboot module was […] included with Ansible 2.1,” while for unix systems it wasn’t added until 2.7. :D For more details, you can read the module’s author blog article.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The explanations&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Ansible runs my script on the remote host to fetch the sets. It creates an answer file from the template and then gives it to upobsd. Once upobsd has created the kernel, Ansible copies it in place of /bsd on the host. The router reboots and boots on /bsd, which is upobsd’s bsd.rd. The installer runs in auto_update mode. Once it comes back from bsd.rd land, it archives the kernel and finishes by upgrading all the packages.&lt;br&gt;
It also supports upgrading without fetching the sets ahead of time. For instance, I upgrade this way on my Pine64 because if I cared about speed, I wouldn’t use this weak computer with its dying SD card. For this case, I just comment out the path_sets variable and Ansible instead creates an answer file that will instruct the installer to fetch the sets from the designated mirror.&lt;br&gt;
I’ve been archiving my kernels for a few years. It’s a nice way to fill up / keep a history of my upgrades. If I spot a regression, I can try a previous kernel … which may not work with the then-desynchronized userland, but that’s another story.&lt;br&gt;
sysmerge already runs with rc.sysmerge in batch mode and sends the result by email. I don’t think there’s merit to running it again in the playbook. The only perk would be discovering in the terminal whether any files need to be manually merged, rather than reading exactly the same output in the email.&lt;br&gt;
Initially, I used the openbsd_pkg module, but it doesn’t work on -current just before a release because pkg_add automatically looks for pub/OpenBSD/${release}/packages/${arch} (which is empty). I wrote and tested this playbook while 6.4 was around the corner, so I switched to command to be able to pass the -Dsnap parameter.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The result&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;I’m very happy with the playbook! It performs the upgrade with as little intervention as possible and minimal downtime. \o/&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://dan.langille.org/2018/11/04/using-smartd-to-automatically-run-tests-on-your-drives/" target="_blank" rel="nofollow noopener"&gt;Using smartd to automatically run tests on your drives&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Those programs can “control and monitor storage systems using the Self-Monitoring, Analysis and Reporting Technology System (SMART) built into most modern ATA/SATA, SCSI/SAS and NVMe disks. In many cases, these utilities will provide advanced warning of disk degradation and failure.” See the smartmontools website for more information.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;NOTE: “Due to OS-specific issues and also depending on the different state of smartmontools development on the platforms, device support is not the same for all OS platforms.” – use the documentation for your OS.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;I first started using smartd in March 2010 (according to that blog post, that’s when I still writing on both The FreeBSD Diary and this blog). Back then, and until recently, all I did was start smartd. As far as I can tell, all it did was send daily status messages via the FreeBSD periodic tools. I would set my drive devices via daily_status_smart_devices in /etc/periodic.conf and the daily status reports would include drive health information.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Two types of tests&lt;/li&gt;
&lt;li&gt;My original abandoned attempt&lt;/li&gt;
&lt;li&gt;How do you prove it works?&lt;/li&gt;
&lt;li&gt;Looking at the test results&lt;/li&gt;
&lt;li&gt;Failed drive to the rescue&lt;/li&gt;
&lt;li&gt;smartd.conf I am using&lt;/li&gt;
&lt;li&gt;supernews&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Beastie Bits&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3833" target="_blank" rel="nofollow noopener"&gt;Decent Pics of “Relayd &amp;amp; Httpd Mastery” signature&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/0xUID/status/1051208357850345472?s=20" target="_blank" rel="nofollow noopener"&gt;A Unix Shell poster from 1983&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/UNIX-historians/" target="_blank" rel="nofollow noopener"&gt;Cambridge UNIX historians (Cambridge, United Kingdom)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hackmd.io/Yv46aOjTS0eYk0m4YLXOTw#" target="_blank" rel="nofollow noopener"&gt;Goals for FreeBSD 13&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/blog/september-october-2018-issue-of-the-freebsd-journal-now-available/" target="_blank" rel="nofollow noopener"&gt;September/October 2018 Issue of the FreeBSD Journal Now Available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/using_acme_sh_for_let" target="_blank" rel="nofollow noopener"&gt;Using acme.sh for Let’s Encrypt certificates on pkgsrc.org servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://jonwillia.ms/2018/09/23/anycast-dns-openbsd" target="_blank" rel="nofollow noopener"&gt;Deploying Anycast DNS Using OpenBSD and BGP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dataswamp.org/~solene/2017-03-17-integrity.html" target="_blank" rel="nofollow noopener"&gt;How to check your data integrity?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Feedback/Questions&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Raymond - &lt;a href="http://dpaste.com/0KNXTJF" target="_blank" rel="nofollow noopener"&gt;MeetBSD California&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Dev Summit Videos: &lt;a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI" target="_blank" rel="nofollow noopener"&gt;https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Conference Videos: &lt;a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b" target="_blank" rel="nofollow noopener"&gt;https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Conference videos are still being processed, the rest should appear over the next few weeks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;Greg - &lt;a href="http://dpaste.com/1W29RSK" target="_blank" rel="nofollow noopener"&gt;Stable vs Release&lt;/a&gt;&lt;br&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;Mjrodriguez - &lt;a href="http://dpaste.com/2XKMR6B#wrap" target="_blank" rel="nofollow noopener"&gt;Open/FreeBSD support for Single Board computers&lt;/a&gt;&lt;br&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;&lt;br&gt;
&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, midnightbsd, eurobsdcon, ansible, dns</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>MidnightBSD 1.0 released, MeetBSD review, EuroBSDcon trip reports, DNS over TLS in FreeBSD 12, Upgrading OpenBSD with Ansible, how to use smartd to run tests on your drives automatically, and more.</p>

<p>##Headlines<br>
###<a href="https://www.midnightbsd.org/news/">MidnightBSD 1.0 now available</a></p>

<blockquote>
<p>I’m happy to announce the availability of MidnightBSD 1.0 for amd64 and i386. Over the years, many ambitious goals were set for our 1.0 release. As it approached, it was clear we wouldn’t be able to accomplish all of them. This release is more of a natural progression rather than a groundbreaking event. It includes many updates to the base system, improvements to the package manager, an updated compiler, and tools.<br>
Of particular note, you can now boot off of ZFS and use NVME SSDs and some AMD Radeon graphics cards support acceleration. AMD Ryzen support has greatly improved in this release. We also have added bhyve from FreeBSD.<br>
The 1.0 release is finally available. Still building packages for i386 and plan to do an amd64 package build later in the week. The single largest issue with the release process has been the web server performance. The CPU is overloaded and has been at solid 100% for several days. The server has a core i7 7700 in it. I’m trying to figure out what to buy as an upgrade so that we don’t continue to have this issue going forward. As it’s actually blocked in multiple processes, a 6 or 8 core chip might be an improvement for the workload…</p>
</blockquote>

<ul>
<li>Download links: <a href="https://www.midnightbsd.org/download/">https://www.midnightbsd.org/download/</a></li>
<li><a href="https://www.youtube.com/watch?time_continue=33&amp;v=-rlk2wFsjJ4">https://www.youtube.com/watch?time_continue=33&amp;v=-rlk2wFsjJ4</a></li>
</ul>

<p><hr></p>

<p>###<a href="https://linuxunplugged.com/articles/meetbsd2018">MeetBSD Review</a></p>

<blockquote>
<p>MeetBSD 2018 took place at the sprawling Intel Santa Clara campus. The venue itself felt more like an olive branch than a simple friendly gesture by Intel. In truth it felt like a bit of an apology. You get the subtle sense they feel bad about how the BSD’s were treated with the Meltdown and Specter flaws. In fact, you may be right to think they felt a bit sorry towards the entire open source community.</p>
</blockquote>

<ul>
<li>MeetBSD 2018</li>
</ul>

<blockquote>
<p>At most massive venues the parking is the first concern, not so here - in fact that was rather straightforward. No, the real challenge is navigating the buildings. Luckily I had help from navigator extraordinaire, Hadea, who located the correct building, SC12 quickly. Finding the entrance took a moment or two though. The lobby itself was converted by iXsystems efficiently into the MeetBSD expo hall, clean, efficient and roomy with registration, some seating, and an extra conference room for on-on-one sessions. On day two sponsor booths were also setup. All who showed up on day one were warmly greeted with badges, lanyards and goodies by Denise and her friendly team.<br>
Like every great BSD event, plenty of food was made available. And as always they make it look effortless. These events showcase iXsystem’s inherent generosity toward its community; with breakfast items in the back of the main auditorium room in the morning, boxed lunches, fruit and cookies at lunch time, and snacks for the rest of the day. But just in case your still hungry, there is a pizza meetup in another Intel room after day one and two.<br>
MeetBSD leverages it’s realistically small crowd size on day one. The morning starts off with introductions of the entire group, the mic is passed around the room.<br>
The group is a good mix of pros in the industry (such as Juniper, Intel, Ebay, Groupon, Cisco, etc), iX staff, and a few enthusiast. Lots of people with a focus or passion for networking. And, of course, some friendly Linux bashing went down for good measure, always followed by a good natured chuckle.</p>
</blockquote>

<ul>
<li>MeetBSD Gives me The Feels</li>
</ul>

<blockquote>
<p>I find that I am subtly unnerved at this venue, and at lunch I saw it clearly. I have always had a strong geek radar, allowing me to navigate a new area (like Berkeley for MeetBSD of 2016, or even SCALE earlier this year in Pasadena), and in a glance I can see who is from my conference and who isn’t. This means it is easy, nearly effortless to know who to greet with a smile and a wave. These are MY people. Here at the Intel campus though it is different. The drive in alone reveals behemoth complexes all with well known tech names prominently displayed. This is Silicon Valley, and all of these people look like MY people. So much for knowing who’s from my conference. Thank goodness for those infamous BSD horns. None-the-less I am struck by how massive these tech giants are. And Intel is one of the largest of those giants, and see the physical reminders of this fact brought home the significance that they had opened their doors, wifi, and bathrooms to the BSD community.</p>
</blockquote>

<p><hr></p>

<p>###[EuroBSDcon 2018 Trip Reports]<br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/</a><br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/</a><br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/</a></p>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://blog.des.no/2018/10/dns-over-tls-in-freebsd-12/">DNS over TLS in FreeBSD 12</a></p>

<blockquote>
<p>With the arrival of OpenSSL 1.1.1, an upgraded Unbound, and some changes to the setup and init scripts, FreeBSD 12.0, currently in beta, now supports DNS over TLS out of the box.<br>
DNS over TLS is just what it sounds like: DNS over TCP, but wrapped in a TLS session. It encrypts your requests and the server’s replies, and optionally allows you to verify the identity of the server. The advantages are protection against eavesdropping and manipulation of your DNS traffic; the drawbacks are a slight performance degradation and potential firewall traversal issues, as it runs over a non-standard port (TCP port 853) which may be blocked on some networks. Let’s take a look at how to set it up.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>We’ve seen how to set up Unbound—specifically, the local_unbound service in FreeBSD 12.0—to use DNS over TLS instead of plain UDP or TCP, using Cloudflare’s public DNS service as an example. We’ve looked at the performance impact, and at how to ensure (and verify) that Unbound validates the server certificate to prevent man-in-the-middle attacks.<br>
The question that remains is whether it is all worth it. There is undeniably a performance hit, though this may improve with TLS 1.3. More importantly, there are currently very few DNS-over-TLS providers—only one, really, since Quad9 filter their responses—and you have to weigh the advantage of encrypting your DNS traffic against the disadvantage of sending it all to a single organization. I can’t answer that question for you, but I can tell you that the parameters are evolving quickly, and if your answer is negative today, it may not remain so for long. More providers will appear. Performance will improve with TLS 1.3 and QUIC. Within a year or two, running DNS over TLS may very well become the rule rather than the experimental exception.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chown.me/blog/upgrading-openbsd-with-ansible.html">Upgrading OpenBSD with Ansible</a></p>

<ul>
<li>My router runs OpenBSD -current</li>
</ul>

<blockquote>
<p>A few months ago, I needed software that had just hit the ports tree. I didn’t want to wait for the next release, so I upgraded my router to use -current. Since then, I’ve continued running -current, which means upgrading to a newer snapshot every so often. Running -current is great, but the process of updating to a newer snapshot was cumbersome. Initially, I had to plug in a serial cable and then reboot into bsd.rd, hit enter ten times, then reboot, run sysmerge and update packages.<br>
I eventually switched to upobsd to be able to upgrade without the need for a serial connection. The process was better, but still tiresome. Usually, I would prepare the special version of bsd.rd, boot on bsd.rd, and do something like wash the dishes in the meantime. After about ten minutes, I would dry my hands and then go back to my workstation to see whether the bsd.rd part had finished so I could run sysmerge and pkg_add, and then return to the dishes while it upgraded packages.<br>
Out of laziness, I thought: “I should automate this,” but what happened instead is that I simply didn’t upgrade that machine very often. (Yes, laziness). With my router out of commission, life is very dull, because it is my gateway to the Internet. Even services hosted at my place (like my Mastodon instance) are not reachable when the router is down because I use multiple VLANs (so I need the router to jump across VLANs).</p>
</blockquote>

<ul>
<li>Ansible Reboot Module</li>
</ul>

<blockquote>
<p>I recently got a new job, and one of my first tasks was auditing the Ansible roles written by my predecessors. In one role, the machine rebooted and they used the wait_for_connection module to wait for it to come back up. That sounded quite hackish to me, so out of curiosity, I tried to determine whether there was a better way. I also thought I might be able to use something similar to further automate my OpenBSD upgrades, and wanted to assess the cleanliness of this method. ;-)<br>
I learned that with the then-upcoming 2.7 Ansible release, a proper reboot module would be included. I went to the docs, which stated that for a certain parameter:<br>
I took this to mean that there was no support for OpenBSD. I looked at the code and, indeed, there was not. However, I believed that it wouldn’t be too hard to add it. I added the missing pieces for OpenBSD, tested it on my poor Pine64 and then submitted it upstream. After a quick back and forth, the module’s author merged it into devel (having a friend working at Red Hat helped the process, merci Cyril !) A couple days later, the release engineer merged it into stable-2.7.<br>
I proceeded to actually write the playbook, and then I hit a bug. The parameter reboot_timeout was not recognized by Ansible. This feature would definitely be useful on a slow machine (such as the Pine64 and its dying SD card). Again, my fix was merged into master by the module’s author and then merged into stable-2.7. 2.7.1 will be the first release to feature these fixes, but if you use OpenBSD -current, you already have access to them. I backported the patches when I updated ansible.<br>
Fun fact about Ansible and reboots: “The win_reboot module was […] included with Ansible 2.1,” while for unix systems it wasn’t added until 2.7. :D For more details, you can read the module’s author blog article.</p>
</blockquote>

<ul>
<li>The explanations</li>
</ul>

<blockquote>
<p>Ansible runs my script on the remote host to fetch the sets. It creates an answer file from the template and then gives it to upobsd. Once upobsd has created the kernel, Ansible copies it in place of /bsd on the host. The router reboots and boots on /bsd, which is upobsd’s bsd.rd. The installer runs in auto_update mode. Once it comes back from bsd.rd land, it archives the kernel and finishes by upgrading all the packages.<br>
It also supports upgrading without fetching the sets ahead of time. For instance, I upgrade this way on my Pine64 because if I cared about speed, I wouldn’t use this weak computer with its dying SD card. For this case, I just comment out the path_sets variable and Ansible instead creates an answer file that will instruct the installer to fetch the sets from the designated mirror.<br>
I’ve been archiving my kernels for a few years. It’s a nice way to fill up / keep a history of my upgrades. If I spot a regression, I can try a previous kernel … which may not work with the then-desynchronized userland, but that’s another story.<br>
sysmerge already runs with rc.sysmerge in batch mode and sends the result by email. I don’t think there’s merit to running it again in the playbook. The only perk would be discovering in the terminal whether any files need to be manually merged, rather than reading exactly the same output in the email.<br>
Initially, I used the openbsd_pkg module, but it doesn’t work on -current just before a release because pkg_add automatically looks for pub/OpenBSD/${release}/packages/${arch} (which is empty). I wrote and tested this playbook while 6.4 was around the corner, so I switched to command to be able to pass the -Dsnap parameter.</p>
</blockquote>

<ul>
<li>The result</li>
</ul>

<blockquote>
<p>I’m very happy with the playbook! It performs the upgrade with as little intervention as possible and minimal downtime. \o/</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://dan.langille.org/2018/11/04/using-smartd-to-automatically-run-tests-on-your-drives/">Using smartd to automatically run tests on your drives</a></p>

<blockquote>
<p>Those programs can “control and monitor storage systems using the Self-Monitoring, Analysis and Reporting Technology System (SMART) built into most modern ATA/SATA, SCSI/SAS and NVMe disks. In many cases, these utilities will provide advanced warning of disk degradation and failure.” See the smartmontools website for more information.</p>
</blockquote>

<blockquote>
<p>NOTE: “Due to OS-specific issues and also depending on the different state of smartmontools development on the platforms, device support is not the same for all OS platforms.” – use the documentation for your OS.</p>
</blockquote>

<blockquote>
<p>I first started using smartd in March 2010 (according to that blog post, that’s when I still writing on both The FreeBSD Diary and this blog). Back then, and until recently, all I did was start smartd. As far as I can tell, all it did was send daily status messages via the FreeBSD periodic tools. I would set my drive devices via daily_status_smart_devices in /etc/periodic.conf and the daily status reports would include drive health information.</p>
</blockquote>

<ul>
<li>Two types of tests</li>
<li>My original abandoned attempt</li>
<li>How do you prove it works?</li>
<li>Looking at the test results</li>
<li>Failed drive to the rescue</li>
<li>smartd.conf I am using</li>
<li>supernews</li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://mwl.io/archives/3833">Decent Pics of “Relayd &amp; Httpd Mastery” signature</a></li>
<li><a href="https://twitter.com/0xUID/status/1051208357850345472?s=20">A Unix Shell poster from 1983</a></li>
<li><a href="https://www.meetup.com/UNIX-historians/">Cambridge UNIX historians (Cambridge, United Kingdom)</a></li>
<li><a href="https://hackmd.io/Yv46aOjTS0eYk0m4YLXOTw#">Goals for FreeBSD 13</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/september-october-2018-issue-of-the-freebsd-journal-now-available/">September/October 2018 Issue of the FreeBSD Journal Now Available</a></li>
<li><a href="https://blog.netbsd.org/tnf/entry/using_acme_sh_for_let">Using acme.sh for Let’s Encrypt certificates on pkgsrc.org servers</a></li>
<li><a href="https://jonwillia.ms/2018/09/23/anycast-dns-openbsd">Deploying Anycast DNS Using OpenBSD and BGP</a></li>
<li><a href="https://dataswamp.org/~solene/2017-03-17-integrity.html">How to check your data integrity?</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Raymond - <a href="http://dpaste.com/0KNXTJF">MeetBSD California</a>
<ul>
<li>Dev Summit Videos: <a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI">https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI</a></li>
<li>Conference Videos: <a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b">https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b</a></li>
<li>Conference videos are still being processed, the rest should appear over the next few weeks.</li>
</ul>

<p></li><br>
<li>Greg - <a href="http://dpaste.com/1W29RSK">Stable vs Release</a></li><br>
<li>Mjrodriguez - <a href="http://dpaste.com/2XKMR6B#wrap">Open/FreeBSD support for Single Board computers</a></li><br>
</ul><br>
<hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>MidnightBSD 1.0 released, MeetBSD review, EuroBSDcon trip reports, DNS over TLS in FreeBSD 12, Upgrading OpenBSD with Ansible, how to use smartd to run tests on your drives automatically, and more.</p>

<p>##Headlines<br>
###<a href="https://www.midnightbsd.org/news/">MidnightBSD 1.0 now available</a></p>

<blockquote>
<p>I’m happy to announce the availability of MidnightBSD 1.0 for amd64 and i386. Over the years, many ambitious goals were set for our 1.0 release. As it approached, it was clear we wouldn’t be able to accomplish all of them. This release is more of a natural progression rather than a groundbreaking event. It includes many updates to the base system, improvements to the package manager, an updated compiler, and tools.<br>
Of particular note, you can now boot off of ZFS and use NVME SSDs and some AMD Radeon graphics cards support acceleration. AMD Ryzen support has greatly improved in this release. We also have added bhyve from FreeBSD.<br>
The 1.0 release is finally available. Still building packages for i386 and plan to do an amd64 package build later in the week. The single largest issue with the release process has been the web server performance. The CPU is overloaded and has been at solid 100% for several days. The server has a core i7 7700 in it. I’m trying to figure out what to buy as an upgrade so that we don’t continue to have this issue going forward. As it’s actually blocked in multiple processes, a 6 or 8 core chip might be an improvement for the workload…</p>
</blockquote>

<ul>
<li>Download links: <a href="https://www.midnightbsd.org/download/">https://www.midnightbsd.org/download/</a></li>
<li><a href="https://www.youtube.com/watch?time_continue=33&amp;v=-rlk2wFsjJ4">https://www.youtube.com/watch?time_continue=33&amp;v=-rlk2wFsjJ4</a></li>
</ul>

<p><hr></p>

<p>###<a href="https://linuxunplugged.com/articles/meetbsd2018">MeetBSD Review</a></p>

<blockquote>
<p>MeetBSD 2018 took place at the sprawling Intel Santa Clara campus. The venue itself felt more like an olive branch than a simple friendly gesture by Intel. In truth it felt like a bit of an apology. You get the subtle sense they feel bad about how the BSD’s were treated with the Meltdown and Specter flaws. In fact, you may be right to think they felt a bit sorry towards the entire open source community.</p>
</blockquote>

<ul>
<li>MeetBSD 2018</li>
</ul>

<blockquote>
<p>At most massive venues the parking is the first concern, not so here - in fact that was rather straightforward. No, the real challenge is navigating the buildings. Luckily I had help from navigator extraordinaire, Hadea, who located the correct building, SC12 quickly. Finding the entrance took a moment or two though. The lobby itself was converted by iXsystems efficiently into the MeetBSD expo hall, clean, efficient and roomy with registration, some seating, and an extra conference room for on-on-one sessions. On day two sponsor booths were also setup. All who showed up on day one were warmly greeted with badges, lanyards and goodies by Denise and her friendly team.<br>
Like every great BSD event, plenty of food was made available. And as always they make it look effortless. These events showcase iXsystem’s inherent generosity toward its community; with breakfast items in the back of the main auditorium room in the morning, boxed lunches, fruit and cookies at lunch time, and snacks for the rest of the day. But just in case your still hungry, there is a pizza meetup in another Intel room after day one and two.<br>
MeetBSD leverages it’s realistically small crowd size on day one. The morning starts off with introductions of the entire group, the mic is passed around the room.<br>
The group is a good mix of pros in the industry (such as Juniper, Intel, Ebay, Groupon, Cisco, etc), iX staff, and a few enthusiast. Lots of people with a focus or passion for networking. And, of course, some friendly Linux bashing went down for good measure, always followed by a good natured chuckle.</p>
</blockquote>

<ul>
<li>MeetBSD Gives me The Feels</li>
</ul>

<blockquote>
<p>I find that I am subtly unnerved at this venue, and at lunch I saw it clearly. I have always had a strong geek radar, allowing me to navigate a new area (like Berkeley for MeetBSD of 2016, or even SCALE earlier this year in Pasadena), and in a glance I can see who is from my conference and who isn’t. This means it is easy, nearly effortless to know who to greet with a smile and a wave. These are MY people. Here at the Intel campus though it is different. The drive in alone reveals behemoth complexes all with well known tech names prominently displayed. This is Silicon Valley, and all of these people look like MY people. So much for knowing who’s from my conference. Thank goodness for those infamous BSD horns. None-the-less I am struck by how massive these tech giants are. And Intel is one of the largest of those giants, and see the physical reminders of this fact brought home the significance that they had opened their doors, wifi, and bathrooms to the BSD community.</p>
</blockquote>

<p><hr></p>

<p>###[EuroBSDcon 2018 Trip Reports]<br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-joseph-mingrone/</a><br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-vinicius-zavam/</a><br>
<a href="https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/">https://www.freebsdfoundation.org/blog/eurobsd-2018-trip-report-emmanuel-vadot/</a></p>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://blog.des.no/2018/10/dns-over-tls-in-freebsd-12/">DNS over TLS in FreeBSD 12</a></p>

<blockquote>
<p>With the arrival of OpenSSL 1.1.1, an upgraded Unbound, and some changes to the setup and init scripts, FreeBSD 12.0, currently in beta, now supports DNS over TLS out of the box.<br>
DNS over TLS is just what it sounds like: DNS over TCP, but wrapped in a TLS session. It encrypts your requests and the server’s replies, and optionally allows you to verify the identity of the server. The advantages are protection against eavesdropping and manipulation of your DNS traffic; the drawbacks are a slight performance degradation and potential firewall traversal issues, as it runs over a non-standard port (TCP port 853) which may be blocked on some networks. Let’s take a look at how to set it up.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>We’ve seen how to set up Unbound—specifically, the local_unbound service in FreeBSD 12.0—to use DNS over TLS instead of plain UDP or TCP, using Cloudflare’s public DNS service as an example. We’ve looked at the performance impact, and at how to ensure (and verify) that Unbound validates the server certificate to prevent man-in-the-middle attacks.<br>
The question that remains is whether it is all worth it. There is undeniably a performance hit, though this may improve with TLS 1.3. More importantly, there are currently very few DNS-over-TLS providers—only one, really, since Quad9 filter their responses—and you have to weigh the advantage of encrypting your DNS traffic against the disadvantage of sending it all to a single organization. I can’t answer that question for you, but I can tell you that the parameters are evolving quickly, and if your answer is negative today, it may not remain so for long. More providers will appear. Performance will improve with TLS 1.3 and QUIC. Within a year or two, running DNS over TLS may very well become the rule rather than the experimental exception.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chown.me/blog/upgrading-openbsd-with-ansible.html">Upgrading OpenBSD with Ansible</a></p>

<ul>
<li>My router runs OpenBSD -current</li>
</ul>

<blockquote>
<p>A few months ago, I needed software that had just hit the ports tree. I didn’t want to wait for the next release, so I upgraded my router to use -current. Since then, I’ve continued running -current, which means upgrading to a newer snapshot every so often. Running -current is great, but the process of updating to a newer snapshot was cumbersome. Initially, I had to plug in a serial cable and then reboot into bsd.rd, hit enter ten times, then reboot, run sysmerge and update packages.<br>
I eventually switched to upobsd to be able to upgrade without the need for a serial connection. The process was better, but still tiresome. Usually, I would prepare the special version of bsd.rd, boot on bsd.rd, and do something like wash the dishes in the meantime. After about ten minutes, I would dry my hands and then go back to my workstation to see whether the bsd.rd part had finished so I could run sysmerge and pkg_add, and then return to the dishes while it upgraded packages.<br>
Out of laziness, I thought: “I should automate this,” but what happened instead is that I simply didn’t upgrade that machine very often. (Yes, laziness). With my router out of commission, life is very dull, because it is my gateway to the Internet. Even services hosted at my place (like my Mastodon instance) are not reachable when the router is down because I use multiple VLANs (so I need the router to jump across VLANs).</p>
</blockquote>

<ul>
<li>Ansible Reboot Module</li>
</ul>

<blockquote>
<p>I recently got a new job, and one of my first tasks was auditing the Ansible roles written by my predecessors. In one role, the machine rebooted and they used the wait_for_connection module to wait for it to come back up. That sounded quite hackish to me, so out of curiosity, I tried to determine whether there was a better way. I also thought I might be able to use something similar to further automate my OpenBSD upgrades, and wanted to assess the cleanliness of this method. ;-)<br>
I learned that with the then-upcoming 2.7 Ansible release, a proper reboot module would be included. I went to the docs, which stated that for a certain parameter:<br>
I took this to mean that there was no support for OpenBSD. I looked at the code and, indeed, there was not. However, I believed that it wouldn’t be too hard to add it. I added the missing pieces for OpenBSD, tested it on my poor Pine64 and then submitted it upstream. After a quick back and forth, the module’s author merged it into devel (having a friend working at Red Hat helped the process, merci Cyril !) A couple days later, the release engineer merged it into stable-2.7.<br>
I proceeded to actually write the playbook, and then I hit a bug. The parameter reboot_timeout was not recognized by Ansible. This feature would definitely be useful on a slow machine (such as the Pine64 and its dying SD card). Again, my fix was merged into master by the module’s author and then merged into stable-2.7. 2.7.1 will be the first release to feature these fixes, but if you use OpenBSD -current, you already have access to them. I backported the patches when I updated ansible.<br>
Fun fact about Ansible and reboots: “The win_reboot module was […] included with Ansible 2.1,” while for unix systems it wasn’t added until 2.7. :D For more details, you can read the module’s author blog article.</p>
</blockquote>

<ul>
<li>The explanations</li>
</ul>

<blockquote>
<p>Ansible runs my script on the remote host to fetch the sets. It creates an answer file from the template and then gives it to upobsd. Once upobsd has created the kernel, Ansible copies it in place of /bsd on the host. The router reboots and boots on /bsd, which is upobsd’s bsd.rd. The installer runs in auto_update mode. Once it comes back from bsd.rd land, it archives the kernel and finishes by upgrading all the packages.<br>
It also supports upgrading without fetching the sets ahead of time. For instance, I upgrade this way on my Pine64 because if I cared about speed, I wouldn’t use this weak computer with its dying SD card. For this case, I just comment out the path_sets variable and Ansible instead creates an answer file that will instruct the installer to fetch the sets from the designated mirror.<br>
I’ve been archiving my kernels for a few years. It’s a nice way to fill up / keep a history of my upgrades. If I spot a regression, I can try a previous kernel … which may not work with the then-desynchronized userland, but that’s another story.<br>
sysmerge already runs with rc.sysmerge in batch mode and sends the result by email. I don’t think there’s merit to running it again in the playbook. The only perk would be discovering in the terminal whether any files need to be manually merged, rather than reading exactly the same output in the email.<br>
Initially, I used the openbsd_pkg module, but it doesn’t work on -current just before a release because pkg_add automatically looks for pub/OpenBSD/${release}/packages/${arch} (which is empty). I wrote and tested this playbook while 6.4 was around the corner, so I switched to command to be able to pass the -Dsnap parameter.</p>
</blockquote>

<ul>
<li>The result</li>
</ul>

<blockquote>
<p>I’m very happy with the playbook! It performs the upgrade with as little intervention as possible and minimal downtime. \o/</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://dan.langille.org/2018/11/04/using-smartd-to-automatically-run-tests-on-your-drives/">Using smartd to automatically run tests on your drives</a></p>

<blockquote>
<p>Those programs can “control and monitor storage systems using the Self-Monitoring, Analysis and Reporting Technology System (SMART) built into most modern ATA/SATA, SCSI/SAS and NVMe disks. In many cases, these utilities will provide advanced warning of disk degradation and failure.” See the smartmontools website for more information.</p>
</blockquote>

<blockquote>
<p>NOTE: “Due to OS-specific issues and also depending on the different state of smartmontools development on the platforms, device support is not the same for all OS platforms.” – use the documentation for your OS.</p>
</blockquote>

<blockquote>
<p>I first started using smartd in March 2010 (according to that blog post, that’s when I still writing on both The FreeBSD Diary and this blog). Back then, and until recently, all I did was start smartd. As far as I can tell, all it did was send daily status messages via the FreeBSD periodic tools. I would set my drive devices via daily_status_smart_devices in /etc/periodic.conf and the daily status reports would include drive health information.</p>
</blockquote>

<ul>
<li>Two types of tests</li>
<li>My original abandoned attempt</li>
<li>How do you prove it works?</li>
<li>Looking at the test results</li>
<li>Failed drive to the rescue</li>
<li>smartd.conf I am using</li>
<li>supernews</li>
</ul>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://mwl.io/archives/3833">Decent Pics of “Relayd &amp; Httpd Mastery” signature</a></li>
<li><a href="https://twitter.com/0xUID/status/1051208357850345472?s=20">A Unix Shell poster from 1983</a></li>
<li><a href="https://www.meetup.com/UNIX-historians/">Cambridge UNIX historians (Cambridge, United Kingdom)</a></li>
<li><a href="https://hackmd.io/Yv46aOjTS0eYk0m4YLXOTw#">Goals for FreeBSD 13</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/september-october-2018-issue-of-the-freebsd-journal-now-available/">September/October 2018 Issue of the FreeBSD Journal Now Available</a></li>
<li><a href="https://blog.netbsd.org/tnf/entry/using_acme_sh_for_let">Using acme.sh for Let’s Encrypt certificates on pkgsrc.org servers</a></li>
<li><a href="https://jonwillia.ms/2018/09/23/anycast-dns-openbsd">Deploying Anycast DNS Using OpenBSD and BGP</a></li>
<li><a href="https://dataswamp.org/~solene/2017-03-17-integrity.html">How to check your data integrity?</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Raymond - <a href="http://dpaste.com/0KNXTJF">MeetBSD California</a>
<ul>
<li>Dev Summit Videos: <a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI">https://www.youtube.com/playlist?list=PLb87fdKUIo8TNG6f94xo9_W-XXrEbqgWI</a></li>
<li>Conference Videos: <a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b">https://www.youtube.com/playlist?list=PLb87fdKUIo8Q41aoPE6vssP-uF4dxk86b</a></li>
<li>Conference videos are still being processed, the rest should appear over the next few weeks.</li>
</ul>

<p></li><br>
<li>Greg - <a href="http://dpaste.com/1W29RSK">Stable vs Release</a></li><br>
<li>Mjrodriguez - <a href="http://dpaste.com/2XKMR6B#wrap">Open/FreeBSD support for Single Board computers</a></li><br>
</ul><br>
<hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>92: BSD After Midnight</title>
  <link>https://www.bsdnow.tv/92</link>
  <guid isPermaLink="false">9d0d8811-2914-45e0-a34f-9638d2c4e761</guid>
  <pubDate>Wed, 03 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9d0d8811-2914-45e0-a34f-9638d2c4e761.mp3" length="48412372" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Zocker, it's like docker on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they're working on native FreeBSD support at the moment&lt;/li&gt;
&lt;li&gt;This blog post is about a docker-&lt;em&gt;like&lt;/em&gt; script, mainly for ease-of-use, that uses only jails and ZFS in the base system&lt;/li&gt;
&lt;li&gt;In total, it's &lt;a href="https://github.com/toddnni/zocker" target="_blank" rel="nofollow noopener"&gt;1,500 lines of shell script&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration&lt;/li&gt;
&lt;li&gt;In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143285964216970&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Patrol Read in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has recently imported some new code to support the &lt;a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" target="_blank" rel="nofollow noopener"&gt;Patrol Read&lt;/a&gt; function of some RAID controllers&lt;/li&gt;
&lt;li&gt;In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool "scrub" operation&lt;/li&gt;
&lt;li&gt;The goal is to protect file integrity by detecting drive failures before they can damage your data&lt;/li&gt;
&lt;li&gt;It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" target="_blank" rel="nofollow noopener"&gt;HAMMER 2 improvements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly BSD has been working on the second generation HAMMER FS&lt;/li&gt;
&lt;li&gt;It now uses LZ4 compression by default, which we've been big fans of in ZFS&lt;/li&gt;
&lt;li&gt;They've also switched to a &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" target="_blank" rel="nofollow noopener"&gt;faster CRC&lt;/a&gt; algorithm, further improving HAMMER's performance, &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" target="_blank" rel="nofollow noopener"&gt;especially&lt;/a&gt; when using iSCSI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation May update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has published another update newsletter, detailing some of the things they've been up to lately&lt;/li&gt;
&lt;li&gt;In it, you'll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation&lt;/li&gt;
&lt;li&gt;Some improvements were also made to FreeBSD's release building process for non-X86 architectures&lt;/li&gt;
&lt;li&gt;There's also an AsiaBSDCon recap that covers some of the presentations and the dev events&lt;/li&gt;
&lt;li&gt;They also have an accompanying &lt;a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" target="_blank" rel="nofollow noopener"&gt;blog post&lt;/a&gt; where Glen Barber talks about more sysadmin and clusteradm work at NYI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Lucas Holt - &lt;a href="mailto:questions@midnightbsd.org" target="_blank" rel="nofollow noopener"&gt;questions@midnightbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/midnightbsd" target="_blank" rel="nofollow noopener"&gt;@midnightbsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;MidnightBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" target="_blank" rel="nofollow noopener"&gt;The launchd on train is never coming&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Replacement of init systems has been quite controversial in the last few years&lt;/li&gt;
&lt;li&gt;Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port &lt;a href="https://en.wikipedia.org/wiki/Launchd" target="_blank" rel="nofollow noopener"&gt;launchd from OS X&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This blog post details the author's opinion on why he thinks we're never going to have launchd in any of the BSDs&lt;/li&gt;
&lt;li&gt;Email us your thoughts on the matter
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" target="_blank" rel="nofollow noopener"&gt;Native SSH comes to… Windows&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what may be the first (and last) mention of Microsoft on BSD Now...&lt;/li&gt;
&lt;li&gt;They've just recently announced that PowerShell will get native SSH support in the near future&lt;/li&gt;
&lt;li&gt;It's not based on the commercial SSH either, it's the same one from OpenBSD that we already use everywhere&lt;/li&gt;
&lt;li&gt;Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions&lt;/li&gt;
&lt;li&gt;The announcement also promises that they'll be working with the OpenSSH community, so we'll see how many Microsoft-submitted patches make it upstream (or how many &lt;a href="http://www.openbsdfoundation.org/index.html" target="_blank" rel="nofollow noopener"&gt;donations&lt;/a&gt; they make)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" target="_blank" rel="nofollow noopener"&gt;Moving to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This blog post describes a long-time Linux user's first BSD switching experience&lt;/li&gt;
&lt;li&gt;The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd&lt;/li&gt;
&lt;li&gt;After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is&lt;/li&gt;
&lt;li&gt;He also plans to write about his experience with other BSDs, and is writing some tutorials too - we'll check in with him again later on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29hS2cI05" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20VRZYBsw" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20bumJ5u9" target="_blank" rel="nofollow noopener"&gt;Ivan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21BU6Pnka" target="_blank" rel="nofollow noopener"&gt;Josh writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, midnightbsd, ghostbsd, zocker, docker, hammerfs, powershell, patrol read, openssh, launchd, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>87: On the List</title>
  <link>https://www.bsdnow.tv/87</link>
  <guid isPermaLink="false">56f4b27b-9384-4cb9-9877-d825f62815a7</guid>
  <pubDate>Wed, 29 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/56f4b27b-9384-4cb9-9877-d825f62815a7.mp3" length="58344340" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142990524317070&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;New PAE support in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has just added &lt;a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" target="_blank" rel="nofollow noopener"&gt;Physical Address Extention&lt;/a&gt; support to the i386 architecture, but it's probably not what you'd think of when you hear the term&lt;/li&gt;
&lt;li&gt;In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that&lt;/li&gt;
&lt;li&gt;Instead, this change specifically allows the system to use the &lt;a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" target="_blank" rel="nofollow noopener"&gt;No-eXecute Bit&lt;/a&gt; of the processor for the userland, further hardening the in-place memory protections&lt;/li&gt;
&lt;li&gt;Other operating systems enable the CPU feature without doing anything to the &lt;a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" target="_blank" rel="nofollow noopener"&gt;page table entries&lt;/a&gt;, so they &lt;strong&gt;do get&lt;/strong&gt; the available memory expansion, but &lt;strong&gt;don't get&lt;/strong&gt; the potential security benefit&lt;/li&gt;
&lt;li&gt;As we discussed in a &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;previous episode&lt;/a&gt;, the AMD64 platform already saw some major W&lt;sup&gt;X&lt;/sup&gt; kernel &lt;strong&gt;and&lt;/strong&gt; userland improvements - the i386 kernel reworking will begin shortly&lt;/li&gt;
&lt;li&gt;Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W&lt;sup&gt;X&lt;/sup&gt; that was already there&lt;/li&gt;
&lt;li&gt;The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/nahannisys/status/591733319357730816" target="_blank" rel="nofollow noopener"&gt;Booting Windows in bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work on FreeBSD's &lt;a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener"&gt;bhyve&lt;/a&gt; continues, and a big addition is on the way&lt;/li&gt;
&lt;li&gt;Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, &lt;em&gt;no Windows&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter&lt;/li&gt;
&lt;li&gt;Graphics emulation is still in the works; this image was taken by booting headless and using RDP&lt;/li&gt;
&lt;li&gt;A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)&lt;/li&gt;
&lt;li&gt;Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out&lt;/li&gt;
&lt;li&gt;Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 0.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;MidnightBSD is a smaller project we've not covered a lot on the show before&lt;/li&gt;
&lt;li&gt;It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use&lt;/li&gt;
&lt;li&gt;They also have their own, smaller version of FreeBSD ports, called "mports"&lt;/li&gt;
&lt;li&gt;If you're already using it, this new version is mainly a security and bugfix release&lt;/li&gt;
&lt;li&gt;It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions&lt;/li&gt;
&lt;li&gt;You can check &lt;a href="http://www.midnightbsd.org/about/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; for more information about the project&lt;/li&gt;
&lt;li&gt;We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989267412968&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;OpenBSD rewrites the file utility&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with the traditional &lt;a href="https://en.wikipedia.org/wiki/File_%28command%29" target="_blank" rel="nofollow noopener"&gt;file&lt;/a&gt; command - it's been around &lt;a href="http://darwinsys.com/file/" target="_blank" rel="nofollow noopener"&gt;since the 1970s&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;For anyone who doesn't know, it's used to determine what type of file something actually is&lt;/li&gt;
&lt;li&gt;This tool doesn't see a lot of development these days, and it's had its share of security issues as well&lt;/li&gt;
&lt;li&gt;Some of those security issues &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141857001403570&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;remain&lt;/a&gt; &lt;a href="https://www.marc.info/?l=freebsd-security&amp;amp;m=142980545021888&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;unfixed&lt;/a&gt; in various BSDs &lt;strong&gt;even today&lt;/strong&gt;, despite being publicly known for a while&lt;/li&gt;
&lt;li&gt;It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it&lt;/li&gt;
&lt;li&gt;When you think about it, file was technically &lt;em&gt;designed&lt;/em&gt; to be used on untrusted files&lt;/li&gt;
&lt;li&gt;OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny&lt;/li&gt;
&lt;li&gt;This new version will, by default, run &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014212727213&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;as an unprivileged user&lt;/a&gt; with no shell, and in a &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014276127454&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;systrace sandbox&lt;/a&gt;, strictly limiting what system calls can be made&lt;/li&gt;
&lt;li&gt;With these two things combined, it should drastically reduce the damage a malicious file could potentially do&lt;/li&gt;
&lt;li&gt;Ian Darwin, the original author of the utility, &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989483913635&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;saw the commit and replied&lt;/a&gt;, in what may be a moment in BSD history to remember&lt;/li&gt;
&lt;li&gt;It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version&lt;/li&gt;
&lt;li&gt;Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Christos Zoulas - &lt;a href="mailto:christos@netbsd.org" target="_blank" rel="nofollow noopener"&gt;christos@netbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" target="_blank" rel="nofollow noopener"&gt;blacklistd&lt;/a&gt; and NetBSD advocacy&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" target="_blank" rel="nofollow noopener"&gt;GSoC-accepted BSD projects&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list&lt;/li&gt;
&lt;li&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/SummerOfCode2015Projects" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. &lt;strong&gt;memory compression and deduplication&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD's &lt;a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp;amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... &lt;strong&gt;porting HAMMER FS to OpenBSD&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;We'll be sure to keep you up to date on developments from both projects&lt;/li&gt;
&lt;li&gt;Hopefully the other BSDs will make the cut too next year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on the Gumstix Duovero&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based &lt;a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" target="_blank" rel="nofollow noopener"&gt;computer-on-module&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They actually look more like a stick of RAM than a mini-computer&lt;/li&gt;
&lt;li&gt;This article shows you how to build a FreeBSD -CURRENT image to run on them, using &lt;a href="https://github.com/freebsd/crochet" target="_blank" rel="nofollow noopener"&gt;crochet-freebsd&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" target="_blank" rel="nofollow noopener"&gt;EU study recommends OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools&lt;/li&gt;
&lt;li&gt;This is especially important, in all countries, after the mass surveillance documents came out &lt;/li&gt;
&lt;li&gt;"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."&lt;/li&gt;
&lt;li&gt;The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on&lt;/li&gt;
&lt;li&gt;Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"&lt;/li&gt;
&lt;li&gt;Reddit, Undeadly and Hacker News also &lt;a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" target="_blank" rel="nofollow noopener"&gt;had&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150427093546" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=9445831" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt;, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with &lt;a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" target="_blank" rel="nofollow noopener"&gt;Voxer&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" target="_blank" rel="nofollow noopener"&gt;M:Tier&lt;/a&gt; before
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD workflow with Git&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too&lt;/li&gt;
&lt;li&gt;This mailing list post talks about interacting &lt;a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" target="_blank" rel="nofollow noopener"&gt;between&lt;/a&gt; the official source repository and the Git mirror&lt;/li&gt;
&lt;li&gt;This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vjh3ogvG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20GMcWvKE" target="_blank" rel="nofollow noopener"&gt;Bryan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21M1imT3d" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s25ScxQSwb" target="_blank" rel="nofollow noopener"&gt;Charles writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, blacklistd, file, pae, w^x, aslr, bhyve, windows, efi, rdp, gumstix, duovero, midnightbsd, coreclr, gsoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
