<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 20 Apr 2026 06:52:38 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Ntpd”</title>
    <link>https://www.bsdnow.tv/tags/ntpd</link>
    <pubDate>Wed, 11 Feb 2015 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>76: Time for a Change</title>
  <link>https://www.bsdnow.tv/76</link>
  <guid isPermaLink="false">b872a625-f3d6-477b-b162-fd4248aef998</guid>
  <pubDate>Wed, 11 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b872a625-f3d6-477b-b162-fd4248aef998.mp3" length="64285204" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:29:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Strange timer bug in FreeBSD 11 (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html)
Peter Wemm (http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure) wrote in to the FreeBSD -CURRENT mailing list with an interesting observation
Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime
This meant things like cron and sleep would break, TCP/IP wouldn't time out or resend packets, a lot of things would break
A workaround until it was fixed was to reboot every 24 days, but this is BSD we're talking about - uptime is our game
An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap
Peter disagreed and gave some background (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html), offering a different patch to fix (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html) the issue and detect it early (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html) if it happens again
Ultimately, the problem was traced back to an issue with a recent clang import
It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***
An OpenBSD mail server (http://technoquarter.blogspot.com/p/series.html)
There's been a recent influx of blog posts about building a BSD mail server for some reason
In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux
In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin
It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd
That means this is more of a "complete solution" - right down to what the end users see
The series is split up into categories so it's very easy to follow along step-by-step
***
How DragonFlyBSD uses git (http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html)
DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code
In a series (http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html) of posts (http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html), Matthew Dillon (the project lead) details their internal setup
They're using vanilla git over ssh, with the developers' accounts set to git-only (no shell access)
The maintainers of the server are the only ones with shell access available
He also details how a cron job syncs from the master to a public box that anyone can check out code from
It would be interesting to hear about how other BSD projects manage their master source repository
***
Why not try PCBSD? (http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd)
ITwire, another more mainstream tech site, published a recent article about switching to PCBSD
They interview a guy named Kris that we've never heard of before
In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same
"With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD."
If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***
Interview - Henning Brauer - henning@openbsd.org (mailto:henning@openbsd.org) / @henningbrauer (https://twitter.com/henningbrauer)
OpenNTPD (http://openntpd.org/) and its portable variant
News Roundup
Authenticated time in OpenNTPD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142356166731390&amp;amp;w=2)
We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated already
While at the hackathon, some developers came up with an alternate way (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142355043928397&amp;amp;w=2) to get authenticated NTP responses
You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool
OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header
It's not intended to be a direct time source, just a constraint to keep things within reason
If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid
Henning (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363215730069&amp;amp;w=2) and Theo (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363400330522&amp;amp;w=2) also weigh in to give some of the backstory on the idea
Lots more detail can be found in Reyk's email explaining the new feature (and it's optional of course)
***
NetBSD at Open Source Conference 2015 Oita and Hamanako (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html)
It's been a while since we've featured one of these trip reports, but the Japanese NetBSD users group is still doing them
This time the conferences were in Oita and Hamanako (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html), Japan
Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices
As always, they took lots of pictures from the event of NetBSD on all these weird machines
***
Poudriere in a jail (http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/)
A common question we get about our poudriere tutorial (http://www.bsdnow.tv/tutorials/poudriere) is "how do I run it in a jail?" - this blog post is about exactly that
It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***
Bruteblock, another way to stop bruteforce (http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh)
We've mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf's built-in rate limiting
Bruteblock is a similar tool, but it's not just for ssh logins - it can do a number of other services
It can also work directly with IPFW, which is a plus if you're using that as your firewall
Add a few lines to your syslog.conf and bruteblock will get executed automatically
The rest of the article takes you through the different settings you can configure for blocking
***
New iwm(4) driver and cross-polination (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142325218626853&amp;amp;w=2)
The OpenBSD guys recently imported a new "iwm" driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)
NetBSD wasted no time in porting it over (https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html), giving a bit of interesting backstory
According to Antti Kantee (http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction), "it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace"
Both projects would appreciate further testing if you have the hardware and can provide useful bug reports
Maybe FreeBSD and DragonFly will port it over too, or come up with something that's partially based on the code
***
PCBSD current images (http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/)
The first PCBSD -CURRENT images should be available this weekend
This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates
For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2E4NbJwzs)
Richard writes in (http://slexy.org/view/s2FkxcSYKy)
Charlie writes in (http://slexy.org/view/s217EgA1JC)
Ben writes in (http://slexy.org/view/s21vlCbGDt)
***
Mailing List Gold
A systematic effort (https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html)
GCC's lunch (https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html)
Hopes and dreams (https://marc.info/?l=openbsd-cvs&amp;amp;m=142331891908776&amp;amp;w=2)
***
Discussion
Comparison of ways to securely tunnel your traffic
OpenVPN (https://openvpn.net/index.php/open-source.html), OpenBSD IKED (http://www.openiked.org/), FreeBSD IPSEC (https://www.freebsd.org/doc/handbook/ipsec.html), OpenSSH (http://www.openssh.com/), Tor (https://www.torproject.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ntp, ntpd, ntimed, openntpd, time keeping, stratum, ipsec, openvpn, ssh, openiked, ike, tor, tunneling, bhws, afl-fuzz, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>23: Time Signatures</title>
  <link>https://www.bsdnow.tv/23</link>
  <guid isPermaLink="false">d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6</guid>
  <pubDate>Wed, 05 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6.mp3" length="54539109" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD foundation's 2013 fundraising results (http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html)
The FreeBSD foundation finally counted all the money they made in 2013
$768,562 from 1659 donors
Nice little blog post from the team with a giant beastie picture
"We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon."
A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***
OpenSSH 6.5 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html)
We mentioned the CFT last week, and it's finally here (https://news.ycombinator.com/item?id=7154925)!
New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519 (now the default when both clients support it)
Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA
Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes can't even attempt to login (http://slexy.org/view/s2rI13v8F4) lol~
New bcrypt private key type, 500,000,000 times harder to brute force
Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one
Portable version already in (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261320) FreeBSD -CURRENT, and ports (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=342618)
Lots more bugfixes and features, see the full release note or our interview (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) with Damien
Work has already started on 6.6, which can be used without OpenSSL (https://twitter.com/msfriedl/status/427902493176377344)!
***
Crazed Ferrets in a Berkeley Shower (http://blather.michaelwlucas.com/archives/1942)
In 2000, MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) wrote an essay for linux.com about why he uses the BSD license: "It’s actually stood up fairly well to the test of time, but it’s fourteen years old now."
This is basically an updated version about why he uses the BSD license, in response to recent comments from Richard Stallman (http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html)
Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL
Check out the full post if you're one of those people that gets into license arguments
The takeaway is "BSD is about making the world a better place. For everyone."
***
OpenBSD on BeagleBone Black (http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black)
Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi
A blog post about installing OpenBSD on a BBB from.. our guest for today!
He describes it as "everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black"
It goes through the whole process, details different storage options and some workarounds
Could be a really fun weekend project if you're interested in small or embedded devices
***
Interview - Ted Unangst - tedu@openbsd.org (mailto:tedu@openbsd.org) / @tedunangst (https://twitter.com/tedunangst)
OpenBSD's signify (http://www.tedunangst.com/flak/post/signify) infrastructure, ZFS on OpenBSD
Tutorial
Running an NTP server (http://www.bsdnow.tv/tutorials/ntpd)
News Roundup
Getting started with FreeBSD (http://smyck.net/2014/02/01/getting-started-with-freebsd/)
A new video and blog series about starting out with FreeBSD
The author has been a fan since the 90s and has installed it on every server he's worked with
He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users
The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***
More OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140204080515)
As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience
He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work
This summary goes into detail about all the stuff he got done there
***
X11 in a jail (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261266)
We've gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!
A new tunable option will let jails access /dev/kmem and similar device nodes
Along with a change to DRM, this allows full X11 in a jail
Be sure to check out our jail tutorial and jailed VNC tutorial (http://www.bsdnow.tv/tutorials) for ideas
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/)
10.0 "Joule Edition" finally released (http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/)!
AMD graphics are now officially supported
GNOME3, MATE and Cinnamon desktops are available
Grub updates and fixes
PCBSD also got a mention in eweek (http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html)
***
Feedback/Questions
Justin writes in (http://slexy.org/view/s21VnbKZsH)
Daniel writes in (http://slexy.org/view/s2nD7RF6bo)
Martin writes in (http://slexy.org/view/s2jwRrj7UV)
Alex writes in (http://slexy.org/view/s201koMD2c) - unofficial FreeBSD RPI Images (http://people.freebsd.org/~gjb/RPI/)
James writes in (http://slexy.org/view/s2AntZmtRU)
John writes in (http://slexy.org/view/s20bGjMsIQ)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, security, gpg, gnupg, signed, packages, iso, set, patches, ted unangst, verify, verification, digital signature, ed25519, chacha20, license, debate, gnu, gpl, general public license, copyleft, copyfree, free software, open source, rms, richard stallman, clang, llvm, cddl, linux, gplv2, gplv3, ntp, ntpd, openntpd, isc, network time protocol, server, ssh, openssh, 6.5, foundation, donations, gcm, aes, aes-gcm, hmac, arm, armv7, beaglebone, black, serial, tty, zol, leaseweb, zfsonlinux, ecc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>21: Tendresse for Ten</title>
  <link>https://www.bsdnow.tv/21</link>
  <guid isPermaLink="false">353e6a60-9bd0-494f-ac34-4337e3dfa734</guid>
  <pubDate>Wed, 22 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/353e6a60-9bd0-494f-ac34-4337e3dfa734.mp3" length="77103576" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:47:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD 10.0-RELEASE is out (https://www.freebsd.org/releases/10.0R/announce.html)
The long awaited, giant release of FreeBSD is now official and ready to be downloaded (http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/)
One of the biggest releases in FreeBSD history, with tons of new updates
Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... the list goes on and on (https://www.freebsd.org/releases/10.0R/relnotes.html)
Start up your freebsd-update or do a source-based upgrade
***
OpenSSH 6.5 CFT (https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html)
Our buddy Damien Miller (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) announced a Call For Testing for OpenSSH 6.5
Huge, huge release, focused on new features rather than bugfixes (but it includes those too)
New ciphers, new key formats, new config options, see the mailing list for all the details
Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***
DIY NAS story, FreeNAS 9.2.1-BETA (http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html)
Another new blog post about FreeNAS!
Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014
"I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS"
Really long article with lots of nice details about his setup, why you might want a NAS, etc.
Speaking of FreeNAS, they released 9.2.1-BETA (http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html) with lots of bugfixes
***
OpenBSD needed funding for electricity.. and they got it (https://news.ycombinator.com/item?id=7069889)
Briefly mentioned at the end of last week's show, but has blown up over the internet since
OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments
They needed about $20,000 to cover electric costs for the server rack in Theo's basement (http://www.openbsd.org/images/rack2009.jpg)
Lots of positive reaction from the community helping out so far, and it appears they have reached their goal (http://www.openbsdfoundation.org/campaign2104.html) and got $100,000 in donations
From Bob Beck: "we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation"
This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***
Interview - Colin Percival - cperciva@freebsd.org (mailto:cperciva@freebsd.org) / @cperciva (https://twitter.com/cperciva)
FreeBSD on Amazon EC2 (http://www.daemonology.net/freebsd-on-ec2/), backups with Tarsnap (https://www.tarsnap.com/), 10.0-RELEASE, various topics
Tutorial
Bandwidth monitoring and testing (http://www.bsdnow.tv/tutorials/vnstat-iperf)
News Roundup
pfSense talk at Tokyo FreeBSD Benkyoukai (https://blog.pfsense.org/?p=1176)
Isaac Levy will be presenting "pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments"
He's also going to be looking for help to translate the pfSense documentation into Japanese
The event is on February 17, 2014 if you're in the Tokyo area
***
m0n0wall 1.8.1 released (http://m0n0.ch/wall/downloads.php)
For those who don't know, m0n0wall is an older BSD-based firewall OS that's mostly focused on embedded applications
pfSense was forked from it in 2004, and has a lot more active development now
They switched to FreeBSD 8.4 for this new version
Full list of updates in the changelog
This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***
Ansible and PF, plus NTP (http://blather.michaelwlucas.com/archives/1933)
Another blog post from our buddy Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)
There've been some NTP amplification attacks recently (https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc) in the news
The post describes how he configured ntpd on a lot of servers without a lot of work
He leverages pf and ansible for the configuration
OpenNTPD is, not surprisingly, unaffected - use it
***
ruBSD videos online (http://undeadly.org/cgi?action=article&amp;amp;sid=20140115054839)
Just a quick followup from a few weeks ago
Theo and Henning's talks from ruBSD are now available for download
There's also a nice interview with Theo
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/)
10.0-RC4 images are available
Wine PBI is now available for 10
9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***
Feedback/Questions
Sha'ul writes in (http://slexy.org/view/s2WQXwMASZ)
Kjell-Aleksander writes in (http://slexy.org/view/s2H0FURAtZ)
Mike writes in (http://slexy.org/view/s21eKKPgqh)
Charlie writes in (and gets a reply) (http://slexy.org/view/s21UMLnV0G)
Kevin writes in (http://slexy.org/view/s2SuazcfoR)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ec2, colin percival, cperciva, amazon, cloud, aws, instance, vm, virtual machine, xen, hypervisor, generic, 10.0, in the cloud, custom kernel, tarsnap, backup, backups, encrypted, dropbox, offsite, off site, crashplan, vnstat, iperf, performance, network, sysctl, throughput, speed, download, upload, check, test, freenas, m0n0wall, pfsense, zfs, vfs, tokyo, benkyokai, benkyoukai, ansible, nas, freenas, pf, ntp, openntpd, vulnerability, ntpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
