<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 14 Apr 2026 15:46:16 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Omnios”</title>
    <link>https://www.bsdnow.tv/tags/omnios</link>
    <pubDate>Thu, 11 Jul 2024 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>567: To the Core</title>
  <link>https://www.bsdnow.tv/567</link>
  <guid isPermaLink="false">d7de607e-7822-486f-8649-0053e89207a6</guid>
  <pubDate>Thu, 11 Jul 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d7de607e-7822-486f-8649-0053e89207a6.mp3" length="60410304" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</itunes:subtitle>
  <itunes:duration>41:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
SSH as a sudo replacement (https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/)
Core.13 is Now In Office (https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html)
News Roundup
Running GoToSocial on NetBSD (https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/)
A DMD package for OpenIndiana (https://briancallahan.net/blog/20240609.html)
Adding more swap space to Omnios (https://neirac.srht.site/posts/omnios-add-swap.html)
OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day (https://undeadly.org/cgi?action=article;sid=20240620105457)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Isa - Pinebook Question.md (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, sudo, replacement, ssh, core.13, gotosocial, DMD, openindiana, omnios, qualcomm, snapdragon elite X</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>560: Why not BSD</title>
  <link>https://www.bsdnow.tv/560</link>
  <guid isPermaLink="false">9822ee64-8eaf-48cf-8603-d583f258fc4f</guid>
  <pubDate>Thu, 23 May 2024 10:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9822ee64-8eaf-48cf-8603-d583f258fc4f.mp3" length="59353728" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Status Report First Quarter 2024, Why not BSD, LibreSSL version 3.9.2 released, Running NetBSD on OmniOS using bhyve, X.Org on NetBSD, Unix version control lore: what, ident, How I search in 2024, sshd split into multiple binaries, and more</itunes:subtitle>
  <itunes:duration>1:01:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD Status Report First Quarter 2024, Why not BSD, LibreSSL version 3.9.2 released, Running NetBSD on OmniOS using bhyve, X.Org on NetBSD, Unix version control lore: what, ident, How I search in 2024, sshd split into multiple binaries, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD Status Report First Quarter 2024 (https://www.freebsd.org/status/report-2024-01-2024-03/)
Why not BSD (https://michal.sapka.me/bsd/why-not-bsd/) + Sequel next week
News Roundup
LibreSSL version 3.9.2 released (https://undeadly.org/cgi?action=article;sid=20240512115958)
Running NetBSD on OmniOS using bhyve (https://www.tumfatig.net/2024/running-netbsd-on-omnios-using-bhyve/)
X.Org on NetBSD - the state of things (https://blog.netbsd.org/tnf/entry/x_org_on_netbsd_the)
Unix version control lore: what, ident (https://dotat.at/@/2024-05-13-what-ident.html)
How I search in 2024 (https://vickiboykis.com/2024/04/25/how-i-search-in-2024/)
sshd(8) split into multiple binaries (https://undeadly.org/cgi?action=article;sid=20240517092416)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, status report, Q1 2024, libressl, omnios, bhyve, version control, lore, what, ident, search, searching, sshd, binaries,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Status Report First Quarter 2024, Why not BSD, LibreSSL version 3.9.2 released, Running NetBSD on OmniOS using bhyve, X.Org on NetBSD, Unix version control lore: what, ident, How I search in 2024, sshd split into multiple binaries, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2024-01-2024-03/" rel="nofollow">FreeBSD Status Report First Quarter 2024</a></p>

<hr>

<p><a href="https://michal.sapka.me/bsd/why-not-bsd/" rel="nofollow">Why not BSD</a> + Sequel next week</p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240512115958" rel="nofollow">LibreSSL version 3.9.2 released</a></p>

<hr>

<p><a href="https://www.tumfatig.net/2024/running-netbsd-on-omnios-using-bhyve/" rel="nofollow">Running NetBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/x_org_on_netbsd_the" rel="nofollow">X.Org on NetBSD - the state of things</a></p>

<hr>

<p><a href="https://dotat.at/@/2024-05-13-what-ident.html" rel="nofollow">Unix version control lore: what, ident</a></p>

<hr>

<p><a href="https://vickiboykis.com/2024/04/25/how-i-search-in-2024/" rel="nofollow">How I search in 2024</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240517092416" rel="nofollow">sshd(8) split into multiple binaries</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Status Report First Quarter 2024, Why not BSD, LibreSSL version 3.9.2 released, Running NetBSD on OmniOS using bhyve, X.Org on NetBSD, Unix version control lore: what, ident, How I search in 2024, sshd split into multiple binaries, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2024-01-2024-03/" rel="nofollow">FreeBSD Status Report First Quarter 2024</a></p>

<hr>

<p><a href="https://michal.sapka.me/bsd/why-not-bsd/" rel="nofollow">Why not BSD</a> + Sequel next week</p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240512115958" rel="nofollow">LibreSSL version 3.9.2 released</a></p>

<hr>

<p><a href="https://www.tumfatig.net/2024/running-netbsd-on-omnios-using-bhyve/" rel="nofollow">Running NetBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/x_org_on_netbsd_the" rel="nofollow">X.Org on NetBSD - the state of things</a></p>

<hr>

<p><a href="https://dotat.at/@/2024-05-13-what-ident.html" rel="nofollow">Unix version control lore: what, ident</a></p>

<hr>

<p><a href="https://vickiboykis.com/2024/04/25/how-i-search-in-2024/" rel="nofollow">How I search in 2024</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240517092416" rel="nofollow">sshd(8) split into multiple binaries</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>559: Rainy WiFi Days</title>
  <link>https://www.bsdnow.tv/559</link>
  <guid isPermaLink="false">9e7884ae-e36e-4f7f-8c73-96cd70d35b45</guid>
  <pubDate>Thu, 16 May 2024 11:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9e7884ae-e36e-4f7f-8c73-96cd70d35b45.mp3" length="54996864" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>An RNG that runs in your brain, Going Stateless, SmolBSD, The Wi-Fi only works when it's raining, Wayland, where are we in 2024?, Omnios pxe booting, OpenBSD scripts to convert wg-quick VPN files, and more</itunes:subtitle>
  <itunes:duration>57:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>An RNG that runs in your brain, Going Stateless, SmolBSD, The Wi-Fi only works when it's raining, Wayland, where are we in 2024?, Omnios pxe booting, OpenBSD scripts to convert wg-quick VPN files, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
An RNG that runs in your brain (https://www.hillelwayne.com/post/randomness/)
Going Stateless (https://dataswamp.org/~solene/2024-04-20-workstation-going-stateless.html)
News Roundup
SmolBSD (https://smolbsd.org)
The Wi-Fi only works when it's raining (https://predr.ag/blog/wifi-only-works-when-its-raining/)
Wayland, where are we in 2024? Any good for being the default? (https://www.dedoimedo.com/computers/wayland-2024.html)
Omnios pxe booting (https://neirac.srht.site/posts/ipxe_boot.html)
OpenBSD scripts to convert wg-quick VPN files (https://dataswamp.org/~solene/2024-04-27-openbsd-wg-quick-converter.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, RNG, brain, stateless, smolbsd, rain, wifi, wayland, omnios, pxe, booting, wg-quick, VPN, wireguard,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>An RNG that runs in your brain, Going Stateless, SmolBSD, The Wi-Fi only works when it&#39;s raining, Wayland, where are we in 2024?, Omnios pxe booting, OpenBSD scripts to convert wg-quick VPN files, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.hillelwayne.com/post/randomness/" rel="nofollow">An RNG that runs in your brain</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-04-20-workstation-going-stateless.html" rel="nofollow">Going Stateless</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://smolbsd.org" rel="nofollow">SmolBSD</a></p>

<hr>

<p><a href="https://predr.ag/blog/wifi-only-works-when-its-raining/" rel="nofollow">The Wi-Fi only works when it&#39;s raining</a></p>

<hr>

<p><a href="https://www.dedoimedo.com/computers/wayland-2024.html" rel="nofollow">Wayland, where are we in 2024? Any good for being the default?</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/ipxe_boot.html" rel="nofollow">Omnios pxe booting</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-04-27-openbsd-wg-quick-converter.html" rel="nofollow">OpenBSD scripts to convert wg-quick VPN files</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>An RNG that runs in your brain, Going Stateless, SmolBSD, The Wi-Fi only works when it&#39;s raining, Wayland, where are we in 2024?, Omnios pxe booting, OpenBSD scripts to convert wg-quick VPN files, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.hillelwayne.com/post/randomness/" rel="nofollow">An RNG that runs in your brain</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-04-20-workstation-going-stateless.html" rel="nofollow">Going Stateless</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://smolbsd.org" rel="nofollow">SmolBSD</a></p>

<hr>

<p><a href="https://predr.ag/blog/wifi-only-works-when-its-raining/" rel="nofollow">The Wi-Fi only works when it&#39;s raining</a></p>

<hr>

<p><a href="https://www.dedoimedo.com/computers/wayland-2024.html" rel="nofollow">Wayland, where are we in 2024? Any good for being the default?</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/ipxe_boot.html" rel="nofollow">Omnios pxe booting</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-04-27-openbsd-wg-quick-converter.html" rel="nofollow">OpenBSD scripts to convert wg-quick VPN files</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>548: NTP - In Memoriam</title>
  <link>https://www.bsdnow.tv/548</link>
  <guid isPermaLink="false">9fc45182-53da-4b7a-8fa2-a408b12d8a5b</guid>
  <pubDate>Thu, 29 Feb 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9fc45182-53da-4b7a-8fa2-a408b12d8a5b.mp3" length="54708480" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</itunes:subtitle>
  <itunes:duration>56:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD Status Report Fourth Quarter 2023 (https://www.freebsd.org/status/report-2023-10-2023-12/)
In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85 (https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/)
News Roundup
Migrate a FreeBSD bhyve virtual machine to OmniOS (https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly)
This blog is AI free (https://dataswamp.org/~solene/2024-01-18-no-ai.html)
Hard disk LEDs and Noisy Machines (https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html)
SSH based comment system (https://blog.haschek.at/2023/ssh-based-comment-system.html)
NetBSD 10 RC.4 is available (https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available)
Beastie Bits
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, status report, ntp, memorium, inventor, migration, migrate, bhyve, vm, virtual machine, omnios, ai-free, blog, LED, hard disk, machine, ssh-based, ssh, comment system, netbsd 10 rc 4</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2023-10-2023-12/" rel="nofollow">FreeBSD Status Report Fourth Quarter 2023</a></p>

<hr>

<p><a href="https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/" rel="nofollow">In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly" rel="nofollow">Migrate a FreeBSD bhyve virtual machine to OmniOS</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-01-18-no-ai.html" rel="nofollow">This blog is AI free</a></p>

<hr>

<p><a href="https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html" rel="nofollow">Hard disk LEDs and Noisy Machines</a></p>

<hr>

<p><a href="https://blog.haschek.at/2023/ssh-based-comment-system.html" rel="nofollow">SSH based comment system</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available" rel="nofollow">NetBSD 10 RC.4 is available</a></p>

<hr>

<h2>Beastie Bits</h2>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2023-10-2023-12/" rel="nofollow">FreeBSD Status Report Fourth Quarter 2023</a></p>

<hr>

<p><a href="https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/" rel="nofollow">In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly" rel="nofollow">Migrate a FreeBSD bhyve virtual machine to OmniOS</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-01-18-no-ai.html" rel="nofollow">This blog is AI free</a></p>

<hr>

<p><a href="https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html" rel="nofollow">Hard disk LEDs and Noisy Machines</a></p>

<hr>

<p><a href="https://blog.haschek.at/2023/ssh-based-comment-system.html" rel="nofollow">SSH based comment system</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available" rel="nofollow">NetBSD 10 RC.4 is available</a></p>

<hr>

<h2>Beastie Bits</h2>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>544: Geeky weather check</title>
  <link>https://www.bsdnow.tv/544</link>
  <guid isPermaLink="false">2f3344c6-0c9e-459a-9035-970e84c6d131</guid>
  <pubDate>Thu, 01 Feb 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2f3344c6-0c9e-459a-9035-970e84c6d131.mp3" length="64449792" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GPL 3: The Controversial Licensing Model and Potential Solutions,
The Geeks way of checking what the outside weather is like, Alpine on a
FreeBSD Jail, DragonFly BSD on a Thinkpad T480s, Dealing with USB Storage
devices on OmniOS, Creating a Time Capsule instance using Samba, FreeBSD, and
ZFS</itunes:subtitle>
  <itunes:duration>1:07:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GPL 3: The Controversial Licensing Model and Potential Solutions,
The Geeks way of checking what the outside weather is like, Alpine on a
FreeBSD Jail, DragonFly BSD on a Thinkpad T480s, Dealing with USB Storage
devices on OmniOS, Creating a Time Capsule instance using Samba, FreeBSD, and
ZFS
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
GPL 3: The Controversial Licensing Model and Potential Solutions (https://klarasystems.com/articles/gpl-3-the-controversial-licensing-model-and-potential-solutions/)
The Geeks way of checking what the outside wheather is like (https://blog.netbsd.org/tnf/entry/the_geeks_way_of_checking)
News Roundup
Alpine on a FreeBSD Jail (https://it-notes.dragas.net/2024/01/18/installing-alpine-linux-on-a-freebsd-jail/)
DragonFly BSD on a Thinkpad T480s (https://git.sr.ht/~tomh/dragonflybsd-on-a-laptop/tree/master/item/README.md)
Dealing with USB Storage devices on OmniOS (https://www.tumfatig.net/2024/dealing-with-usb-storage-devices-on-omnios/)
Creating a Time Capsule instance using Samba, FreeBSD, and ZFS (https://dan.langille.org/2024/01/06/creating-a-time-capsule-instance-using-samba-freebsd-and-zfs-2/)
Conferences
FOSDEM (https://fosdem.org/2024/)
AsiaBSDCon (https://2024.asiabsdcon.org/program.html)
BSDCan (https://www.bsdcan.org/2024/papers.php)
EuroBSDcon (https://2024.eurobsdcon.org/)
Southeast Linuxfest (https://southeastlinuxfest.org/2024/01/self-2024-call-for-participation/)
Dont let the name fool you, SELF is BSD friendly and they'd love to have BSD/Unix Talks if you're in the area. JT is staff at SELF, so he can put in a good word for you. ;)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, controversy, gpl3, license model, weather, outside, geek, Alpine, jail, DragonFly, Thinkpad, T480s, OmniOS, storage device, time capsule, samba, zfs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GPL 3: The Controversial Licensing Model and Potential Solutions,<br>
The Geeks way of checking what the outside weather is like, Alpine on a<br>
FreeBSD Jail, DragonFly BSD on a Thinkpad T480s, Dealing with USB Storage<br>
devices on OmniOS, Creating a Time Capsule instance using Samba, FreeBSD, and<br>
ZFS</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/gpl-3-the-controversial-licensing-model-and-potential-solutions/" rel="nofollow">GPL 3: The Controversial Licensing Model and Potential Solutions</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/the_geeks_way_of_checking" rel="nofollow">The Geeks way of checking what the outside wheather is like</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://it-notes.dragas.net/2024/01/18/installing-alpine-linux-on-a-freebsd-jail/" rel="nofollow">Alpine on a FreeBSD Jail</a></p>

<hr>

<p><a href="https://git.sr.ht/%7Etomh/dragonflybsd-on-a-laptop/tree/master/item/README.md" rel="nofollow">DragonFly BSD on a Thinkpad T480s</a></p>

<hr>

<p><a href="https://www.tumfatig.net/2024/dealing-with-usb-storage-devices-on-omnios/" rel="nofollow">Dealing with USB Storage devices on OmniOS</a></p>

<hr>

<p><a href="https://dan.langille.org/2024/01/06/creating-a-time-capsule-instance-using-samba-freebsd-and-zfs-2/" rel="nofollow">Creating a Time Capsule instance using Samba, FreeBSD, and ZFS</a></p>

<hr>

<h2>Conferences</h2>

<p><a href="https://fosdem.org/2024/" rel="nofollow">FOSDEM</a></p>

<p><a href="https://2024.asiabsdcon.org/program.html" rel="nofollow">AsiaBSDCon</a></p>

<p><a href="https://www.bsdcan.org/2024/papers.php" rel="nofollow">BSDCan</a></p>

<p><a href="https://2024.eurobsdcon.org/" rel="nofollow">EuroBSDcon</a></p>

<p><a href="https://southeastlinuxfest.org/2024/01/self-2024-call-for-participation/" rel="nofollow">Southeast Linuxfest</a></p>

<ul>
<li>Dont let the name fool you, SELF is BSD friendly and they&#39;d love to have BSD/Unix Talks if you&#39;re in the area. JT is staff at SELF, so he can put in a good word for you. ;)</li>
</ul>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GPL 3: The Controversial Licensing Model and Potential Solutions,<br>
The Geeks way of checking what the outside weather is like, Alpine on a<br>
FreeBSD Jail, DragonFly BSD on a Thinkpad T480s, Dealing with USB Storage<br>
devices on OmniOS, Creating a Time Capsule instance using Samba, FreeBSD, and<br>
ZFS</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/gpl-3-the-controversial-licensing-model-and-potential-solutions/" rel="nofollow">GPL 3: The Controversial Licensing Model and Potential Solutions</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/the_geeks_way_of_checking" rel="nofollow">The Geeks way of checking what the outside wheather is like</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://it-notes.dragas.net/2024/01/18/installing-alpine-linux-on-a-freebsd-jail/" rel="nofollow">Alpine on a FreeBSD Jail</a></p>

<hr>

<p><a href="https://git.sr.ht/%7Etomh/dragonflybsd-on-a-laptop/tree/master/item/README.md" rel="nofollow">DragonFly BSD on a Thinkpad T480s</a></p>

<hr>

<p><a href="https://www.tumfatig.net/2024/dealing-with-usb-storage-devices-on-omnios/" rel="nofollow">Dealing with USB Storage devices on OmniOS</a></p>

<hr>

<p><a href="https://dan.langille.org/2024/01/06/creating-a-time-capsule-instance-using-samba-freebsd-and-zfs-2/" rel="nofollow">Creating a Time Capsule instance using Samba, FreeBSD, and ZFS</a></p>

<hr>

<h2>Conferences</h2>

<p><a href="https://fosdem.org/2024/" rel="nofollow">FOSDEM</a></p>

<p><a href="https://2024.asiabsdcon.org/program.html" rel="nofollow">AsiaBSDCon</a></p>

<p><a href="https://www.bsdcan.org/2024/papers.php" rel="nofollow">BSDCan</a></p>

<p><a href="https://2024.eurobsdcon.org/" rel="nofollow">EuroBSDcon</a></p>

<p><a href="https://southeastlinuxfest.org/2024/01/self-2024-call-for-participation/" rel="nofollow">Southeast Linuxfest</a></p>

<ul>
<li>Dont let the name fool you, SELF is BSD friendly and they&#39;d love to have BSD/Unix Talks if you&#39;re in the area. JT is staff at SELF, so he can put in a good word for you. ;)</li>
</ul>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>543: OpenBSD Workstation Hardening</title>
  <link>https://www.bsdnow.tv/543</link>
  <guid isPermaLink="false">caf89436-cf84-432e-a1cd-a88fc3385198</guid>
  <pubDate>Thu, 25 Jan 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/caf89436-cf84-432e-a1cd-a88fc3385198.mp3" length="56984832" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</itunes:subtitle>
  <itunes:duration>59:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs (https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/)
2023 in Review: Continuous Integration and Workflow Improvement (https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/)
News Roundup
Running OpenBSD on OmniOS using bhyve (https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/)
FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory? (https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/)
OpenBSD workstation hardening (https://dataswamp.org/~solene/2023-12-31-hardened-openbsd-workstation.html)
KDE Plasma now linked to packages build on -current (https://www.undeadly.org/cgi?action=article;sid=20231227120851&amp;amp;utm_source=bsdweekly)
MidnightBSD 3.1.3 release (https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Kieran - Feedback (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md)
Albin - links inquires questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, best practices, databases, vm, virtual machine, review 2023, continuous integration, workflow improvement, omnios, bhyve, jailed datasets, workstation, hardening, KDE plasma, midnightbsd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/" rel="nofollow">2023 in Review: Continuous Integration and Workflow Improvement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/" rel="nofollow">Running OpenBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/" rel="nofollow">FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2023-12-31-hardened-openbsd-workstation.html" rel="nofollow">OpenBSD workstation hardening</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20231227120851&utm_source=bsdweekly" rel="nofollow">KDE Plasma now linked to packages build on -current</a></p>

<hr>

<p><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release" rel="nofollow">MidnightBSD 3.1.3 release</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md" rel="nofollow">Kieran - Feedback</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md" rel="nofollow">Albin - links inquires questions</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs, 2023 in Review: Continuous Integration and Workflow Improvement, Running OpenBSD on OmniOS using bhyve, FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?, OpenBSD workstation hardening, KDE Plasma now linked to packages build on -current, MidnightBSD 3.1.3 release</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-3-databases-and-vms/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases Part 3: Databases and VMs</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/continuous-integration-and-workflow-improvement/" rel="nofollow">2023 in Review: Continuous Integration and Workflow Improvement</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-openbsd-on-omnios-using-bhyve/" rel="nofollow">Running OpenBSD on OmniOS using bhyve</a></p>

<hr>

<p><a href="https://dan.langille.org/2023/12/25/freebsd-jailed-zfs-datasets-how-do-i-find-the-zfs-snapshot-directory/" rel="nofollow">FreeBSD jailed ZFS datasets – how do I find the .zfs/snapshot directory?</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2023-12-31-hardened-openbsd-workstation.html" rel="nofollow">OpenBSD workstation hardening</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20231227120851&utm_source=bsdweekly" rel="nofollow">KDE Plasma now linked to packages build on -current</a></p>

<hr>

<p><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-3-release" rel="nofollow">MidnightBSD 3.1.3 release</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Kieran%20-%20Feedback.md" rel="nofollow">Kieran - Feedback</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/543/feedback/Albin%20-%20links%20inquires%20questions.md" rel="nofollow">Albin - links inquires questions</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>359: Throwaway Browser</title>
  <link>https://www.bsdnow.tv/359</link>
  <guid isPermaLink="false">b066740d-03a5-423b-9ab9-8936c3246979</guid>
  <pubDate>Thu, 16 Jul 2020 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b066740d-03a5-423b-9ab9-8936c3246979.mp3" length="44787992" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Throw-Away Browser on FreeBSD With "pot" within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</itunes:subtitle>
  <itunes:duration>43:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Throw-Away Browser on FreeBSD With "pot" within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/)
Headlines
Throw-Away Browser on FreeBSD With "pot" Within 5 Minutes (https://honeyguide.eu/posts/pot-throwaway-firefox/)
pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).
OpenBSD guest with bhyve - OmniOS (https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html)
Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.
News Roundup
BSD versus Linux distribution development (https://distrowatch.com/weekly.php?issue=20200622#qa)
Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.
My FreeBSD Laptop Build (https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html)
I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.
FreeBSD CURRENT Binary Upgrades (http://up.bsd.lv)
Disclaimer
This proof-of-concept is not a publication of FreeBSD.
Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Karl - pfsense (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md)
Val - esxi question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md)
lars - openbsd router hardware (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, zfs, interview, browser, throw-away, throw away, pot, omnios, vm, guest, virtualization, bhyve, linux, development, distribution, laptop, binary upgrades</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Throw-Away Browser on FreeBSD With &quot;pot&quot; within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://honeyguide.eu/posts/pot-throwaway-firefox/" rel="nofollow">Throw-Away Browser on FreeBSD With &quot;pot&quot; Within 5 Minutes</a></h3>

<blockquote>
<p>pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).</p>
</blockquote>

<hr>

<h3><a href="https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html" rel="nofollow">OpenBSD guest with bhyve - OmniOS</a></h3>

<blockquote>
<p>Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.<br>
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200622#qa" rel="nofollow">BSD versus Linux distribution development</a></h3>

<blockquote>
<p>Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?<br>
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.</p>

<hr>

<h3><a href="https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html" rel="nofollow">My FreeBSD Laptop Build</a></h3>

<p>I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.<br>
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.</p>

<hr>

<h3><a href="http://up.bsd.lv" rel="nofollow">FreeBSD CURRENT Binary Upgrades</a></h3>

<ul>
<li>Disclaimer
This proof-of-concept is not a publication of FreeBSD.</li>
<li>Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.</li>
</ul>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md" rel="nofollow">Karl - pfsense</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md" rel="nofollow">Val - esxi question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md" rel="nofollow">lars - openbsd router hardware</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Throw-Away Browser on FreeBSD With &quot;pot&quot; within 5 minutes, OmniOS as OpenBSD guest with bhyve, BSD vs Linux distro development, My FreeBSD Laptop Build, FreeBSD CURRENT Binary Upgrades, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://honeyguide.eu/posts/pot-throwaway-firefox/" rel="nofollow">Throw-Away Browser on FreeBSD With &quot;pot&quot; Within 5 Minutes</a></h3>

<blockquote>
<p>pot is a great and relatively new jail management tool. It offers DevOps style provisioning and can even be used to provide Docker-like, scalable cloud services together with nomad and consul (more about this in Orchestrating jails with nomad and pot).</p>
</blockquote>

<hr>

<h3><a href="https://www.pbdigital.org/omniosce/bhyve/openbsd/2020/06/08/bhyve-zones-omnios.html" rel="nofollow">OpenBSD guest with bhyve - OmniOS</a></h3>

<blockquote>
<p>Today I will be creating a OpenBSD guest via bhyve on OmniOS. I will also be adding a Pass Through Ethernet Controller so I can have a multi-homed guest that will serve as a firewall/router.<br>
This post will cover setting up bhyve on OmniOS, so it will also be a good introduction to bhyve. As well, I look into OpenBSD’s uEFI boot loader so if you have had trouble with this, then you are in the right place.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20200622#qa" rel="nofollow">BSD versus Linux distribution development</a></h3>

<blockquote>
<p>Q: Comparing-apples-to-BSDs asks: I was reading one of the old articles from the archive. One of the things mentioned was how the BSDs have a distinct approach in terms of packaging the base system relative to userland apps, and that the Linux distros at the time were not following the same practice. Are there Linux distros that have adopted the same approach in modern times? If not, are there technical limitations that are preventing them from doing so, such as some distros supporting multiple kernel versions maybe?<br>
DistroWatch answers: In the article mentioned above, I made the observation that Linux distributions tend to take one of two approaches when it comes to packaging software. Generally a Linux distribution will either offer a rolling release, where virtually all packages are regularly upgraded to their latest stable releases, or a fixed release where almost all packages are kept at a set version number and only receive bug fixes for the life cycle of the distribution. Projects like Arch Linux and Void are popular examples of rolling, always-up-to-date distributions while Fedora and Ubuntu offer fixed platforms.</p>

<hr>

<h3><a href="https://corrupted.io/2020/06/21/my-freebsd-laptop-build.html" rel="nofollow">My FreeBSD Laptop Build</a></h3>

<p>I have always liked Thinkpad hardware and when I started to do more commuting I decided I needed something that had a decent sized screen but fit well on a bus. Luckily about this time Lenovo gave me a nice gift in the Thinkpad X390. Its basically the famous X2xx series but with a 13” screen and smaller bezel.<br>
So with this laptop I figured it was time to actually put the docs together on how I got my FreeBSD workstation working on it. I will here in the near future have another post that will cover this for HardenedBSD as well since the steps are similar but have a few extra gotchas due to the extra hardening.</p>

<hr>

<h3><a href="http://up.bsd.lv" rel="nofollow">FreeBSD CURRENT Binary Upgrades</a></h3>

<ul>
<li>Disclaimer
This proof-of-concept is not a publication of FreeBSD.</li>
<li>Description
up.bsd.lv is a proof-of-concept of binary updates for FreeBSD/amd64 CURRENT/HEAD to facilitate the exhaustive testing of FreeBSD and the bhyve hypervisor and OpenZFS 2.0 specifically. Updates are based on the SVN revisions of official FreeBSD Release Engineering bi-monthly snapshots.</li>
</ul>
</blockquote>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Karl%20-%20pfsense.md" rel="nofollow">Karl - pfsense</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/Val%20-%20esxi%20question.md" rel="nofollow">Val - esxi question</a></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/359/Feedback/lars%20-%20openbsd%20router%20hardware.md" rel="nofollow">lars - openbsd router hardware</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>339: BSD Fundraising</title>
  <link>https://www.bsdnow.tv/339</link>
  <guid isPermaLink="false">581b71e1-6a98-41d7-b8d8-477eaaaba8db</guid>
  <pubDate>Thu, 27 Feb 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/581b71e1-6a98-41d7-b8d8-477eaaaba8db.mp3" length="38843791" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.</itunes:subtitle>
  <itunes:duration>53:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines
Meet FuryBSD: A New Desktop BSD Distribution (https://itsfoss.com/furybsd/)
At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.
You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.
As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”
Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.
NetBSD 9.0 (https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html)
The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.
This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.
News Roundup
OpenBSD Foundation 2019 campaign wrapup (http://undeadly.org/cgi?action=article;sid=20200217001107)
Our target for 2019 was CDN$300K. Our community's continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.
We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!
OpenBSD Foundation 2019 Fundraising Goal Exceeded (https://www.openbsdfoundation.org/campaign2019.html)
A retrospective on our OmniOS ZFS-based NFS fileservers (https://utcc.utoronto.ca/~cks/space/blog/solaris/OmniOSFileserverRetrospective)
Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.
I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.
On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I'm pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.
NetBSD Fundraising 2020 goal (http://blog.netbsd.org/tnf/entry/fundraising_2020)
Is it really more than 10 years since we last had an official fundraising drive?
Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.
OpenSSH 8.2 released February 14, 2020 (http://www.openssh.com/txt/release-8.2)
OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at https://www.openssh.com/.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:
https://www.openssh.com/donations.html
Beastie Bits
FreeNAS vs. Unraid: GRUDGE MATCH! (https://www.youtube.com/watch?v=aXsRIrC5bjg)
Unix Toolbox (http://cb.vu/unixtoolbox.xhtml)
Rigs of Rods - OpenBSD Physics Game (https://docs.rigsofrods.org/)
NYCBug - Dr Vixie (http://dpaste.com/0V35MAB#wrap)
Hamilton BSD User group will meet again on March 10th](http://studybsd.com/)
BSD Stockholm - Meetup March 3rd 2020 (https://www.meetup.com/BSD-Users-Stockholm/events/267873938/)
Feedback/Questions
Shirkdog - Question (http://dpaste.com/36E2BZ1)
Master One - ZFS + Suspend/resume (http://dpaste.com/3B9M814#wrap)
Micah Roth - ZFS write caching (http://dpaste.com/0D4GDX1#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, furybsd, desktop, desktop bsd, netbsd 9.0, openbsd foundation, campaign wrapup, retrospective, omnios, zfs, nfs, fileserver, netbsd fundraising, fundraising goal, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines</p>

<h3><a href="https://itsfoss.com/furybsd/" rel="nofollow">Meet FuryBSD: A New Desktop BSD Distribution</a></h3>

<blockquote>
<p>At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.</p>

<p>You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.</p>

<p>As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”</p>

<p>Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.</p>
</blockquote>

<hr>

<h3><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9.0</a></h3>

<blockquote>
<p>The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.</p>

<p>This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20200217001107" rel="nofollow">OpenBSD Foundation 2019 campaign wrapup</a></h3>

<blockquote>
<p>Our target for 2019 was CDN$300K. Our community&#39;s continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.</p>

<p>We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!</p>
</blockquote>

<ul>
<li><a href="https://www.openbsdfoundation.org/campaign2019.html" rel="nofollow">OpenBSD Foundation 2019 Fundraising Goal Exceeded</a></li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/OmniOSFileserverRetrospective" rel="nofollow">A retrospective on our OmniOS ZFS-based NFS fileservers</a></h3>

<blockquote>
<p>Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.</p>

<p>I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.</p>

<p>On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I&#39;m pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/fundraising_2020" rel="nofollow">NetBSD Fundraising 2020 goal</a></h3>

<blockquote>
<p>Is it really more than 10 years since we last had an official fundraising drive?</p>

<p>Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.2" rel="nofollow">OpenSSH 8.2 released February 14, 2020</a></h3>

<blockquote>
<p>OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at <a href="https://www.openssh.com/" rel="nofollow">https://www.openssh.com/</a>.</p>

<p>OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.</p>

<p>Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:</p>
</blockquote>

<ul>
<li><a href="https://www.openssh.com/donations.html" rel="nofollow">https://www.openssh.com/donations.html</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=aXsRIrC5bjg" rel="nofollow">FreeNAS vs. Unraid: GRUDGE MATCH!</a></li>
<li><a href="http://cb.vu/unixtoolbox.xhtml" rel="nofollow">Unix Toolbox</a></li>
<li><a href="https://docs.rigsofrods.org/" rel="nofollow">Rigs of Rods - OpenBSD Physics Game</a></li>
<li><a href="http://dpaste.com/0V35MAB#wrap" rel="nofollow">NYCBug - Dr Vixie</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/267873938/" rel="nofollow">BSD Stockholm - Meetup March 3rd 2020</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Shirkdog - <a href="http://dpaste.com/36E2BZ1" rel="nofollow">Question</a></li>
<li>Master One - <a href="http://dpaste.com/3B9M814#wrap" rel="nofollow">ZFS + Suspend/resume</a></li>
<li>Micah Roth - <a href="http://dpaste.com/0D4GDX1#wrap" rel="nofollow">ZFS write caching</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0339.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Meet FuryBSD, NetBSD 9.0 has been released, OpenBSD Foundation 2019 campaign wrapup, a retrospective on OmniOS ZFS-based NFS fileservers, NetBSD Fundraising 2020 goal, OpenSSH 8.2 released, and more.## Headlines</p>

<h3><a href="https://itsfoss.com/furybsd/" rel="nofollow">Meet FuryBSD: A New Desktop BSD Distribution</a></h3>

<blockquote>
<p>At its heart, FuryBSD is a very simple beast. According to the site, “FuryBSD is a back to basics lightweight desktop distribution based on stock FreeBSD.” It is basically FreeBSD with a desktop environment pre-configured and several apps preinstalled. The goal is to quickly get a FreeBSD-based system running on your computer.</p>

<p>You might be thinking that this sounds a lot like a couple of other BSDs that are available, such as NomadBSD and GhostBSD. The major difference between those BSDs and FuryBSD is that FuryBSD is much closer to stock FreeBSD. For example, FuryBSD uses the FreeBSD installer, while others have created their own installers and utilities.</p>

<p>As it states on the site, “Although FuryBSD may resemble past graphical BSD projects like PC-BSD and TrueOS, FuryBSD is created by a different team and takes a different approach focusing on tight integration with FreeBSD. This keeps overhead low and maintains compatibility with upstream.” The lead dev also told me that “One key focus for FuryBSD is for it to be a small live media with a few assistive tools to test drivers for hardware.”</p>

<p>Currently, you can go to the FuryBSD homepage and download either an XFCE or KDE LiveCD. A GNOME version is in the works.</p>
</blockquote>

<hr>

<h3><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.0.html" rel="nofollow">NetBSD 9.0</a></h3>

<blockquote>
<p>The NetBSD Project is pleased to announce NetBSD 9.0, the seventeenth major release of the NetBSD operating system.</p>

<p>This release brings significant improvements in terms of hardware support, quality assurance, security, along with new features and hundreds of bug fixes. Here are some highlights of this new release.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20200217001107" rel="nofollow">OpenBSD Foundation 2019 campaign wrapup</a></h3>

<blockquote>
<p>Our target for 2019 was CDN$300K. Our community&#39;s continued generosity combined with our corporate donors exceeded that nicely. In addition we received the largest single donation in our history, CDN$380K from Smartisan. The return of Google was another welcome event. Altogether 2019 was our most successful campaign to date, yielding CDN$692K in total.</p>

<p>We thank all our donors, Iridium (Smartisan), Platinum (Yandex, Google), Gold (Microsoft, Facebook) Silver (2Keys) and Bronze (genua, Thinkst Canary). But especially our community of smaller donors whose contributions are the bedrock of our support. Thank you all!</p>
</blockquote>

<ul>
<li><a href="https://www.openbsdfoundation.org/campaign2019.html" rel="nofollow">OpenBSD Foundation 2019 Fundraising Goal Exceeded</a></li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/OmniOSFileserverRetrospective" rel="nofollow">A retrospective on our OmniOS ZFS-based NFS fileservers</a></h3>

<blockquote>
<p>Our OmniOS fileservers have now been out of service for about six months, which makes it somewhat past time for a retrospective on them. Our OmniOS fileservers followed on our Solaris fileservers, which I wrote a two part retrospective on (part 1, part 2), and have now been replaced by our Linux fileservers. To be honest, I have been sitting on my hands about writing this retrospective because we have mixed feelings about our OmniOS fileservers.</p>

<p>I will put the summary up front. OmniOS worked reasonably well for us over its lifespan here and looking back I think it was almost certainly the right choice for us at the time we made that choice (which was 2013 and 2014). However it was not without issues that marred our experience with it in practice, although not enough to make me regret that we ran it (and ran it for as long as we did). Part of our issues are likely due to a design mistake in making our fileservers too big, although this design mistake was probably magnified when we were unable to use Intel 10G-T networking in OmniOS.</p>

<p>On the one hand, our OmniOS fileservers worked, almost always reliably. Like our Solaris fileservers before them, they ran quietly for years without needing much attention, delivering NFS fileservice to our Ubuntu servers; specifically, we ran them for about five years (2014 through 2019, although we started migrating away at the end of 2018). Over this time we had only minor hardware issues and not all that many disk failures, and we suffered no data loss (with ZFS checksums likely saving us several times, and certainly providing good reassurances). Our overall environment was easy to manage and was pretty much problem free in the face of things like failed disks. I&#39;m pretty sure that our users saw a NFS environment that was solid, reliable, and performed well pretty much all of the time, which is the important thing. So OmniOS basically delivered the fileserver environment we wanted.</p>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/fundraising_2020" rel="nofollow">NetBSD Fundraising 2020 goal</a></h3>

<blockquote>
<p>Is it really more than 10 years since we last had an official fundraising drive?</p>

<p>Looking at old TNF financial reports I noticed that we have been doing quite well financially over the last years, with a steady stream of small and medium donations, and most of the time only moderate expenditures. The last fundraising drive back in 2009 was a giant success, and we have lived off it until now.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.2" rel="nofollow">OpenSSH 8.2 released February 14, 2020</a></h3>

<blockquote>
<p>OpenSSH 8.2 was released on 2020-02-14. It is available from the mirrors listed at <a href="https://www.openssh.com/" rel="nofollow">https://www.openssh.com/</a>.</p>

<p>OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support.</p>

<p>Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at:</p>
</blockquote>

<ul>
<li><a href="https://www.openssh.com/donations.html" rel="nofollow">https://www.openssh.com/donations.html</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=aXsRIrC5bjg" rel="nofollow">FreeNAS vs. Unraid: GRUDGE MATCH!</a></li>
<li><a href="http://cb.vu/unixtoolbox.xhtml" rel="nofollow">Unix Toolbox</a></li>
<li><a href="https://docs.rigsofrods.org/" rel="nofollow">Rigs of Rods - OpenBSD Physics Game</a></li>
<li><a href="http://dpaste.com/0V35MAB#wrap" rel="nofollow">NYCBug - Dr Vixie</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/267873938/" rel="nofollow">BSD Stockholm - Meetup March 3rd 2020</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Shirkdog - <a href="http://dpaste.com/36E2BZ1" rel="nofollow">Question</a></li>
<li>Master One - <a href="http://dpaste.com/3B9M814#wrap" rel="nofollow">ZFS + Suspend/resume</a></li>
<li>Micah Roth - <a href="http://dpaste.com/0D4GDX1#wrap" rel="nofollow">ZFS write caching</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0339.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>319: Lack Rack, Jack</title>
  <link>https://www.bsdnow.tv/319</link>
  <guid isPermaLink="false">19c9942c-0790-4157-af73-31faf1e2b8e4</guid>
  <pubDate>Wed, 09 Oct 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/19c9942c-0790-4157-af73-31faf1e2b8e4.mp3" length="48841583" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Causing ZFS corruption for fun, NetBSD Assembly Programming Tutorial, The IKEA Lack Rack for Servers, a new OmniOS Community Edition LTS has been published, List Block Devices on FreeBSD lsblk(8) Style, Project Trident 19.10 available, and more.</itunes:subtitle>
  <itunes:duration>1:07:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Causing ZFS corruption for fun, NetBSD Assembly Programming Tutorial, The IKEA Lack Rack for Servers, a new OmniOS Community Edition LTS has been published, List Block Devices on FreeBSD lsblk(8) Style, Project Trident 19.10 available, and more.
Headlines
Causing ZFS corruption for fun and profit (https://datto.engineering/post/causing-zfs-corruption)
Datto backs up data, a lot of it. At the time of writing Datto has over 500 PB of data stored on ZFS. This count includes both backup appliances that are sent to customer sites, as well as cloud storage servers that are used for secondary and tertiary backup of those appliances. At this scale drive swaps are a daily occurrence, and data corruption is inevitable. How we handle this corruption when it happens determines whether we truly lose data, or successfully restore from secondary backup. In this post we'll be showing you how at Datto we intentionally cause corruption in our testing environments, to ensure we're building software that can properly handle these scenarios.
Causing Corruption
Since this is a mirror setup, a naive solution to cause corruption would be to randomly dd the same sectors of both /dev/sdb and /dev/sdc. This works, but is equally likely to just overwrite random unused space, or take down the zpool entirely. What we really want is to corrupt a specific snapshot, or even a specific file in that snapshot, to simulate a more realistic minor corruption event. Luckily we have a tool called zdb that lets us view some low level information about datasets.
Conclusion
At the 500 PB scale, it's not a matter of if data corruption will happen but when. Intentionally causing corruption is one of the strategies we use to ensure we're building software that can handle these rare (but inevitable) events.
To others out there using ZFS: I'm curious to hear how you've solved this problem. We did quite a bit of experimentation with zinject before going with this more brute force method. So I'd be especially interested if you've had luck simply simulating corruption with zinject.
NetBSD Assembly Programming Tutorial (https://polprog.net/blog/netbsdasmprog/)
A sparc64 version is also being prepared and will be added when done
This post describes how to write a simple hello world program in pure assembly on NetBSD/amd64. We will not use (nor link against) libc, nor use gcc to compile it. I will be using GNU as (gas), and therefore the AT&amp;amp;T syntax instead of Intel.
Why assembly?
Why not? Because it's fun to program in assembly directly. Contrary to a popular belief assembly programs aren't always faster than what optimizing compilers produce. Nevertheless it's good to be able to read assembly, especially when debugging C programs
Due to the nature of the guide, visit the site for the complete breakdown
News Roundup
The IKEA Lack Rack for Servers (https://wiki.eth0.nl/index.php/LackRack)
The LackRack
First occurrence on eth0:2010 Winterlan, the LackRack is the ultimate, low-cost, high shininess solution for your modular datacenter-in-the-living-room. Featuring the LACK (side table) from Ikea, the LackRack is an easy-to-implement, exact-fit datacenter building block. It's a little known fact that we have seen Google engineers tinker with Lack tables since way back in 2009.
The LackRack will certainly make its appearance again this summer at eth0:2010 Summer.
Summary
When temporarily not in use, multiple LackRacks can be stacked in a space-efficient way without disassembly, unlike competing 19" server racks.
The LackRack was first seen on eth0:2010 Winterlan in the no-shoe Lounge area. Its low-cost and perfect fit are great for mounting up to 8 U of 19" hardware, such as switches (see below), or perhaps other 19" gear. It's very easy to assemble, and thanks to the design, they are stable enough to hold (for example) 19" switches and you can put your bottle of Club-Mate on top! Multi-shiny LackRack can also be painted to your specific preferences and the airflow is unprecedented!
Howto
You can find a howto on buying a LackRack on this page. This includes the proof that a 19" switch can indeed be placed in the LackRack in its natural habitat!
OmniOS Community Edition r151030 LTS - Published at May 6, 2019 (https://omniosce.org/article/release-030)
The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.
OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.
This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.
If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.
For full relase notes including upgrade instructions;
release notes (https://omniosce.org/releasenotes.html)
upgrade instructions (https://omniosce.org/upgrade.html)
List Block Devices on FreeBSD lsblk(8) Style (https://vermaden.wordpress.com/2019/09/27/list-block-devices-on-freebsd-lsblk8-style/)
When I have to work on Linux systems I usually miss many nice FreeBSD tools such as these for example to name the few: sockstat, gstat, top -b -o res, top -m io -o total, usbconfig, rcorder, beadm/bectl, idprio/rtprio,… but sometimes – which rarely happens – Linux has some very useful tool that is not available on FreeBSD. An example of such tool is lsblk(8) that does one thing and does it quite well – lists block devices and their contents. It has some problems like listing a disk that is entirely used under ZFS pool on which lsblk(8) displays two partitions instead of information about ZFS just being there – but we all know how much in some circles the CDDL licensed ZFS is unloved in that GPL world.
Example lsblk(8) output from Linux system:

$ lsblk
NAME                         MAJ:MIN RM   SIZE RO TYPE   MOUNTPOINT
sr0                           11:0    1  1024M  0 rom
sda                            8:0    0 931.5G  0 disk
|-sda1                         8:1    0   500M  0 part   /boot
`-sda2                         8:2    0   931G  0 part
  |-vg_local-lv_root (dm-0)  253:0    0    50G  0 lvm    /
  |-vg_local-lv_swap (dm-1)  253:1    0  17.7G  0 lvm    [SWAP]
  `-vg_local-lv_home (dm-2)  253:2    0   1.8T  0 lvm    /home
sdc                            8:32   0 232.9G  0 disk
`-sdc1                         8:33   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data
sdd                            8:48   0 232.9G  0 disk
`-sdd1                         8:49   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data

What FreeBSD offers in this department? The camcontrol(8) and geom(8) commands are available. You can also use gpart(8) command to list partitions. Below you will find output of these commands from my single disk laptop. Please note that because of WordPress limitations I need to change all &amp;gt; &amp;lt; characters to ] [ ones in the commands outputs.
See the article for the rest of the guide
Project Trident 19.10 Now Available (https://project-trident.org/post/2019-10-05_19.10_available/)
This is a general package update to the CURRENT release repository based upon TrueOS 19.10
PACKAGE CHANGES FROM 19.08
New Packages: 601
Deleted Packages: 165
Updated Packages: 3341
Beastie Bits
NetBSD building tools (https://imgur.com/gallery/0sG4b1K)
Sponsorships open for SNMP Mastery (https://mwl.io/archives/4569)
pkgsrc-2019Q3 release announcement (2019-10-03) (http://mail-index.netbsd.org/pkgsrc-users/2019/10/03/msg029485.html)
pfetch - A simple system information tool written in POSIX sh (https://github.com/dylanaraps/pfetch)
Taking NetBSD kernel bug roast to the next level: Kernel Fuzzers (quick A.D. 2019 overview) (https://netbsd.org/~kamil/eurobsdcon2019_fuzzing/presentation.html#slide1)
Cracking Ken Thomson’s password (https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html)
Feedback/Questions
Evilham - Couple Questions (http://dpaste.com/2JC85WV)
Rob - APU2 alternatives and GPT partition types (http://dpaste.com/0SDX9ZX)
Tom - FreeBSD journal article by A. Fengler (http://dpaste.com/2B43MY1#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, Untitled 1interview, zfs, assembly, assembly programming, programming, programming tutorial, ikea, rack, server rack, omnios, omnios lts, lsblk, project trident</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Causing ZFS corruption for fun, NetBSD Assembly Programming Tutorial, The IKEA Lack Rack for Servers, a new OmniOS Community Edition LTS has been published, List Block Devices on FreeBSD lsblk(8) Style, Project Trident 19.10 available, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://datto.engineering/post/causing-zfs-corruption" rel="nofollow">Causing ZFS corruption for fun and profit</a></h3>

<blockquote>
<p>Datto backs up data, a lot of it. At the time of writing Datto has over 500 PB of data stored on ZFS. This count includes both backup appliances that are sent to customer sites, as well as cloud storage servers that are used for secondary and tertiary backup of those appliances. At this scale drive swaps are a daily occurrence, and data corruption is inevitable. How we handle this corruption when it happens determines whether we truly lose data, or successfully restore from secondary backup. In this post we&#39;ll be showing you how at Datto we intentionally cause corruption in our testing environments, to ensure we&#39;re building software that can properly handle these scenarios.</p>
</blockquote>

<ul>
<li>Causing Corruption</li>
</ul>

<blockquote>
<p>Since this is a mirror setup, a naive solution to cause corruption would be to randomly dd the same sectors of both /dev/sdb and /dev/sdc. This works, but is equally likely to just overwrite random unused space, or take down the zpool entirely. What we really want is to corrupt a specific snapshot, or even a specific file in that snapshot, to simulate a more realistic minor corruption event. Luckily we have a tool called zdb that lets us view some low level information about datasets.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>At the 500 PB scale, it&#39;s not a matter of if data corruption will happen but when. Intentionally causing corruption is one of the strategies we use to ensure we&#39;re building software that can handle these rare (but inevitable) events.</p>

<p>To others out there using ZFS: I&#39;m curious to hear how you&#39;ve solved this problem. We did quite a bit of experimentation with zinject before going with this more brute force method. So I&#39;d be especially interested if you&#39;ve had luck simply simulating corruption with zinject.</p>
</blockquote>

<hr>

<h3><a href="https://polprog.net/blog/netbsdasmprog/" rel="nofollow">NetBSD Assembly Programming Tutorial</a></h3>

<blockquote>
<p>A sparc64 version is also being prepared and will be added when done</p>

<p>This post describes how to write a simple hello world program in pure assembly on NetBSD/amd64. We will not use (nor link against) libc, nor use gcc to compile it. I will be using GNU as (gas), and therefore the AT&amp;T syntax instead of Intel.</p>
</blockquote>

<ul>
<li>Why assembly?</li>
</ul>

<blockquote>
<p>Why not? Because it&#39;s fun to program in assembly directly. Contrary to a popular belief assembly programs aren&#39;t always faster than what optimizing compilers produce. Nevertheless it&#39;s good to be able to read assembly, especially when debugging C programs</p>
</blockquote>

<ul>
<li>Due to the nature of the guide, visit the site for the complete breakdown</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://wiki.eth0.nl/index.php/LackRack" rel="nofollow">The IKEA Lack Rack for Servers</a></h3>

<ul>
<li>The LackRack</li>
</ul>

<blockquote>
<p>First occurrence on eth0:2010 Winterlan, the LackRack is the ultimate, low-cost, high shininess solution for your modular datacenter-in-the-living-room. Featuring the LACK (side table) from Ikea, the LackRack is an easy-to-implement, exact-fit datacenter building block. It&#39;s a little known fact that we have seen Google engineers tinker with Lack tables since way back in 2009.</p>

<p>The LackRack will certainly make its appearance again this summer at eth0:2010 Summer.</p>
</blockquote>

<ul>
<li>Summary</li>
</ul>

<blockquote>
<p>When temporarily not in use, multiple LackRacks can be stacked in a space-efficient way without disassembly, unlike competing 19&quot; server racks.</p>

<p>The LackRack was first seen on eth0:2010 Winterlan in the no-shoe Lounge area. Its low-cost and perfect fit are great for mounting up to 8 U of 19&quot; hardware, such as switches (see below), or perhaps other 19&quot; gear. It&#39;s very easy to assemble, and thanks to the design, they are stable enough to hold (for example) 19&quot; switches and you can put your bottle of Club-Mate on top! Multi-shiny LackRack can also be painted to your specific preferences and the airflow is unprecedented!</p>
</blockquote>

<ul>
<li>Howto</li>
</ul>

<blockquote>
<p>You can find a howto on buying a LackRack on this page. This includes the proof that a 19&quot; switch can indeed be placed in the LackRack in its natural habitat!</p>
</blockquote>

<hr>

<h3><a href="https://omniosce.org/article/release-030" rel="nofollow">OmniOS Community Edition r151030 LTS - Published at May 6, 2019</a></h3>

<blockquote>
<p>The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.</p>

<p>OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.</p>

<p>This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.</p>

<p>If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.</p>
</blockquote>

<ul>
<li>For full relase notes including upgrade instructions;</li>
<li><a href="https://omniosce.org/releasenotes.html" rel="nofollow">release notes</a></li>
<li><a href="https://omniosce.org/upgrade.html" rel="nofollow">upgrade instructions</a></li>
</ul>

<hr>

<h3><a href="https://vermaden.wordpress.com/2019/09/27/list-block-devices-on-freebsd-lsblk8-style/" rel="nofollow">List Block Devices on FreeBSD lsblk(8) Style</a></h3>

<blockquote>
<p>When I have to work on Linux systems I usually miss many nice FreeBSD tools such as these for example to name the few: sockstat, gstat, top -b -o res, top -m io -o total, usbconfig, rcorder, beadm/bectl, idprio/rtprio,… but sometimes – which rarely happens – Linux has some very useful tool that is not available on FreeBSD. An example of such tool is lsblk(8) that does one thing and does it quite well – lists block devices and their contents. It has some problems like listing a disk that is entirely used under ZFS pool on which lsblk(8) displays two partitions instead of information about ZFS just being there – but we all know how much in some circles the CDDL licensed ZFS is unloved in that GPL world.</p>
</blockquote>

<p>Example lsblk(8) output from Linux system:</p>

<pre><code>$ lsblk
NAME                         MAJ:MIN RM   SIZE RO TYPE   MOUNTPOINT
sr0                           11:0    1  1024M  0 rom
sda                            8:0    0 931.5G  0 disk
|-sda1                         8:1    0   500M  0 part   /boot
`-sda2                         8:2    0   931G  0 part
  |-vg_local-lv_root (dm-0)  253:0    0    50G  0 lvm    /
  |-vg_local-lv_swap (dm-1)  253:1    0  17.7G  0 lvm    [SWAP]
  `-vg_local-lv_home (dm-2)  253:2    0   1.8T  0 lvm    /home
sdc                            8:32   0 232.9G  0 disk
`-sdc1                         8:33   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data
sdd                            8:48   0 232.9G  0 disk
`-sdd1                         8:49   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data
</code></pre>

<blockquote>
<p>What FreeBSD offers in this department? The camcontrol(8) and geom(8) commands are available. You can also use gpart(8) command to list partitions. Below you will find output of these commands from my single disk laptop. Please note that because of WordPress limitations I need to change all &gt; &lt; characters to ] [ ones in the commands outputs.</p>
</blockquote>

<ul>
<li>See the article for the rest of the guide</li>
</ul>

<hr>

<h3><a href="https://project-trident.org/post/2019-10-05_19.10_available/" rel="nofollow">Project Trident 19.10 Now Available</a></h3>

<blockquote>
<p>This is a general package update to the CURRENT release repository based upon TrueOS 19.10</p>
</blockquote>

<ul>
<li>PACKAGE CHANGES FROM 19.08

<ul>
<li>New Packages: 601</li>
<li>Deleted Packages: 165</li>
<li>Updated Packages: 3341</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://imgur.com/gallery/0sG4b1K" rel="nofollow">NetBSD building tools</a></li>
<li><a href="https://mwl.io/archives/4569" rel="nofollow">Sponsorships open for SNMP Mastery</a></li>
<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/10/03/msg029485.html" rel="nofollow">pkgsrc-2019Q3 release announcement (2019-10-03)</a></li>
<li><a href="https://github.com/dylanaraps/pfetch" rel="nofollow">pfetch - A simple system information tool written in POSIX sh</a></li>
<li><a href="https://netbsd.org/%7Ekamil/eurobsdcon2019_fuzzing/presentation.html#slide1" rel="nofollow">Taking NetBSD kernel bug roast to the next level: Kernel Fuzzers (quick A.D. 2019 overview)</a></li>
<li><a href="https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html" rel="nofollow">Cracking Ken Thomson’s password</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Evilham - <a href="http://dpaste.com/2JC85WV" rel="nofollow">Couple Questions</a></li>
<li>Rob - <a href="http://dpaste.com/0SDX9ZX" rel="nofollow">APU2 alternatives and GPT partition types</a></li>
<li>Tom - <a href="http://dpaste.com/2B43MY1#wrap" rel="nofollow">FreeBSD journal article by A. Fengler</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0319.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Causing ZFS corruption for fun, NetBSD Assembly Programming Tutorial, The IKEA Lack Rack for Servers, a new OmniOS Community Edition LTS has been published, List Block Devices on FreeBSD lsblk(8) Style, Project Trident 19.10 available, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://datto.engineering/post/causing-zfs-corruption" rel="nofollow">Causing ZFS corruption for fun and profit</a></h3>

<blockquote>
<p>Datto backs up data, a lot of it. At the time of writing Datto has over 500 PB of data stored on ZFS. This count includes both backup appliances that are sent to customer sites, as well as cloud storage servers that are used for secondary and tertiary backup of those appliances. At this scale drive swaps are a daily occurrence, and data corruption is inevitable. How we handle this corruption when it happens determines whether we truly lose data, or successfully restore from secondary backup. In this post we&#39;ll be showing you how at Datto we intentionally cause corruption in our testing environments, to ensure we&#39;re building software that can properly handle these scenarios.</p>
</blockquote>

<ul>
<li>Causing Corruption</li>
</ul>

<blockquote>
<p>Since this is a mirror setup, a naive solution to cause corruption would be to randomly dd the same sectors of both /dev/sdb and /dev/sdc. This works, but is equally likely to just overwrite random unused space, or take down the zpool entirely. What we really want is to corrupt a specific snapshot, or even a specific file in that snapshot, to simulate a more realistic minor corruption event. Luckily we have a tool called zdb that lets us view some low level information about datasets.</p>
</blockquote>

<ul>
<li>Conclusion</li>
</ul>

<blockquote>
<p>At the 500 PB scale, it&#39;s not a matter of if data corruption will happen but when. Intentionally causing corruption is one of the strategies we use to ensure we&#39;re building software that can handle these rare (but inevitable) events.</p>

<p>To others out there using ZFS: I&#39;m curious to hear how you&#39;ve solved this problem. We did quite a bit of experimentation with zinject before going with this more brute force method. So I&#39;d be especially interested if you&#39;ve had luck simply simulating corruption with zinject.</p>
</blockquote>

<hr>

<h3><a href="https://polprog.net/blog/netbsdasmprog/" rel="nofollow">NetBSD Assembly Programming Tutorial</a></h3>

<blockquote>
<p>A sparc64 version is also being prepared and will be added when done</p>

<p>This post describes how to write a simple hello world program in pure assembly on NetBSD/amd64. We will not use (nor link against) libc, nor use gcc to compile it. I will be using GNU as (gas), and therefore the AT&amp;T syntax instead of Intel.</p>
</blockquote>

<ul>
<li>Why assembly?</li>
</ul>

<blockquote>
<p>Why not? Because it&#39;s fun to program in assembly directly. Contrary to a popular belief assembly programs aren&#39;t always faster than what optimizing compilers produce. Nevertheless it&#39;s good to be able to read assembly, especially when debugging C programs</p>
</blockquote>

<ul>
<li>Due to the nature of the guide, visit the site for the complete breakdown</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://wiki.eth0.nl/index.php/LackRack" rel="nofollow">The IKEA Lack Rack for Servers</a></h3>

<ul>
<li>The LackRack</li>
</ul>

<blockquote>
<p>First occurrence on eth0:2010 Winterlan, the LackRack is the ultimate, low-cost, high shininess solution for your modular datacenter-in-the-living-room. Featuring the LACK (side table) from Ikea, the LackRack is an easy-to-implement, exact-fit datacenter building block. It&#39;s a little known fact that we have seen Google engineers tinker with Lack tables since way back in 2009.</p>

<p>The LackRack will certainly make its appearance again this summer at eth0:2010 Summer.</p>
</blockquote>

<ul>
<li>Summary</li>
</ul>

<blockquote>
<p>When temporarily not in use, multiple LackRacks can be stacked in a space-efficient way without disassembly, unlike competing 19&quot; server racks.</p>

<p>The LackRack was first seen on eth0:2010 Winterlan in the no-shoe Lounge area. Its low-cost and perfect fit are great for mounting up to 8 U of 19&quot; hardware, such as switches (see below), or perhaps other 19&quot; gear. It&#39;s very easy to assemble, and thanks to the design, they are stable enough to hold (for example) 19&quot; switches and you can put your bottle of Club-Mate on top! Multi-shiny LackRack can also be painted to your specific preferences and the airflow is unprecedented!</p>
</blockquote>

<ul>
<li>Howto</li>
</ul>

<blockquote>
<p>You can find a howto on buying a LackRack on this page. This includes the proof that a 19&quot; switch can indeed be placed in the LackRack in its natural habitat!</p>
</blockquote>

<hr>

<h3><a href="https://omniosce.org/article/release-030" rel="nofollow">OmniOS Community Edition r151030 LTS - Published at May 6, 2019</a></h3>

<blockquote>
<p>The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.</p>

<p>OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.</p>

<p>This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.</p>

<p>If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.</p>
</blockquote>

<ul>
<li>For full relase notes including upgrade instructions;</li>
<li><a href="https://omniosce.org/releasenotes.html" rel="nofollow">release notes</a></li>
<li><a href="https://omniosce.org/upgrade.html" rel="nofollow">upgrade instructions</a></li>
</ul>

<hr>

<h3><a href="https://vermaden.wordpress.com/2019/09/27/list-block-devices-on-freebsd-lsblk8-style/" rel="nofollow">List Block Devices on FreeBSD lsblk(8) Style</a></h3>

<blockquote>
<p>When I have to work on Linux systems I usually miss many nice FreeBSD tools such as these for example to name the few: sockstat, gstat, top -b -o res, top -m io -o total, usbconfig, rcorder, beadm/bectl, idprio/rtprio,… but sometimes – which rarely happens – Linux has some very useful tool that is not available on FreeBSD. An example of such tool is lsblk(8) that does one thing and does it quite well – lists block devices and their contents. It has some problems like listing a disk that is entirely used under ZFS pool on which lsblk(8) displays two partitions instead of information about ZFS just being there – but we all know how much in some circles the CDDL licensed ZFS is unloved in that GPL world.</p>
</blockquote>

<p>Example lsblk(8) output from Linux system:</p>

<pre><code>$ lsblk
NAME                         MAJ:MIN RM   SIZE RO TYPE   MOUNTPOINT
sr0                           11:0    1  1024M  0 rom
sda                            8:0    0 931.5G  0 disk
|-sda1                         8:1    0   500M  0 part   /boot
`-sda2                         8:2    0   931G  0 part
  |-vg_local-lv_root (dm-0)  253:0    0    50G  0 lvm    /
  |-vg_local-lv_swap (dm-1)  253:1    0  17.7G  0 lvm    [SWAP]
  `-vg_local-lv_home (dm-2)  253:2    0   1.8T  0 lvm    /home
sdc                            8:32   0 232.9G  0 disk
`-sdc1                         8:33   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data
sdd                            8:48   0 232.9G  0 disk
`-sdd1                         8:49   0 232.9G  0 part
  `-md1                        9:1    0 232.9G  0 raid10 /data
</code></pre>

<blockquote>
<p>What FreeBSD offers in this department? The camcontrol(8) and geom(8) commands are available. You can also use gpart(8) command to list partitions. Below you will find output of these commands from my single disk laptop. Please note that because of WordPress limitations I need to change all &gt; &lt; characters to ] [ ones in the commands outputs.</p>
</blockquote>

<ul>
<li>See the article for the rest of the guide</li>
</ul>

<hr>

<h3><a href="https://project-trident.org/post/2019-10-05_19.10_available/" rel="nofollow">Project Trident 19.10 Now Available</a></h3>

<blockquote>
<p>This is a general package update to the CURRENT release repository based upon TrueOS 19.10</p>
</blockquote>

<ul>
<li>PACKAGE CHANGES FROM 19.08

<ul>
<li>New Packages: 601</li>
<li>Deleted Packages: 165</li>
<li>Updated Packages: 3341</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://imgur.com/gallery/0sG4b1K" rel="nofollow">NetBSD building tools</a></li>
<li><a href="https://mwl.io/archives/4569" rel="nofollow">Sponsorships open for SNMP Mastery</a></li>
<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/10/03/msg029485.html" rel="nofollow">pkgsrc-2019Q3 release announcement (2019-10-03)</a></li>
<li><a href="https://github.com/dylanaraps/pfetch" rel="nofollow">pfetch - A simple system information tool written in POSIX sh</a></li>
<li><a href="https://netbsd.org/%7Ekamil/eurobsdcon2019_fuzzing/presentation.html#slide1" rel="nofollow">Taking NetBSD kernel bug roast to the next level: Kernel Fuzzers (quick A.D. 2019 overview)</a></li>
<li><a href="https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html" rel="nofollow">Cracking Ken Thomson’s password</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Evilham - <a href="http://dpaste.com/2JC85WV" rel="nofollow">Couple Questions</a></li>
<li>Rob - <a href="http://dpaste.com/0SDX9ZX" rel="nofollow">APU2 alternatives and GPT partition types</a></li>
<li>Tom - <a href="http://dpaste.com/2B43MY1#wrap" rel="nofollow">FreeBSD journal article by A. Fengler</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0319.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>301: GPU Passthrough</title>
  <link>https://www.bsdnow.tv/301</link>
  <guid isPermaLink="false">d11a1228-2ac2-4e13-9d11-7a4c5a2dc0c1</guid>
  <pubDate>Wed, 05 Jun 2019 23:15:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d11a1228-2ac2-4e13-9d11-7a4c5a2dc0c1.mp3" length="32812013" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>GPU passthrough on bhyve, confusion with used/free disk space on ZFS, OmniOS Community Edition, pfSense 2.4.4 Release p3, NetBSD 8.1 RC1, FreeNAS as your Server OS, and more.</itunes:subtitle>
  <itunes:duration>45:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>GPU passthrough on bhyve, confusion with used/free disk space on ZFS, OmniOS Community Edition, pfSense 2.4.4 Release p3, NetBSD 8.1 RC1, FreeNAS as your Server OS, and more.
&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://passthroughpo.st/gpu-passthrough-reported-working-on-bhyve/"&gt;GPU Passthrough Reported Working on Bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Normally we cover news focused on KVM and sometimes Xen, but something very special has happened with their younger cousin in the BSD world, Bhyve.
  For those that don’t know, Bhyve (pronounced bee-hive) is the native hypervisor in FreeBSD. It has many powerful features, but one that’s been a pain point for some years now is VGA passthrough. Consumer GPUs have not been useable until very recently despite limited success with enterprise cards.
  However, Twitter user Michael Yuji found a workaround that enables passing through a consumer card to any *nix system configured to use X11:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;https://twitter.com/michael_yuji/status/1127136891365658625&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;All you have to do is add a line pointing the X server to the Bus ID of the passed card and the VM will boot, with acceleration and everything. He theorizes that this may not be possible on windows because of the way it looks for display devices, but it’s a solid start.
  As soon as development surrounding VGA passthrough matures on Bhyve, it will become a very attractive alternative to more common tools like Hyper-V and Qemu, because it makes many powerful features available in the host system like jails, boot environments, BSD networking, and tight ZFS integration. For example, you could potentially run your Router, NAS, preferred workstation OS and any number of other things in one box, and only have to spin up a single VM because of the flexibility afforded by jails over Linux-based containers.
  The user who found this workaround also announced they’d be writing it up at some point, so stay tuned for details on the process.
  It’s been slow going on Bhyve passthrough development for a while, but this new revelation is encouraging. We’ll be closely monitoring the situation and report on any other happenings.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://oshogbo.vexillium.org/blog/65/"&gt;Confusion with used/free disk space in ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I use ZFS extensively. ZFS is my favorite file system. I write articles and give lectures about it. I work with it every day. In traditional file systems we use df(1) to determine free space on partitions. We can also use du(1) to count the size of the files in the directory. But it’s different on ZFS and this is the most confusing thing EVER. I always forget which tool reports what disk space usage! Every time somebody asks me, I need to google it. For this reason I decided to document it here - for myself - because if I can’t remember it at least I will not need to google it, as it will be on my blog, but maybe you will also benefit from this blog post if you have the same problem or you are starting your journey with ZFS.&lt;/p&gt;
  
  &lt;p&gt;The understanding of how ZFS is uses space and how to determine which value means what is a crucial thing. I hope thanks to this article I will finally remember it!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://omniosce.org/article/release-030.html"&gt;OmniOS Community Edition&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.
  OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.
  This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.
  If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.
  The OmniOS team and the illumos community have been very active in creating new features and improving existing ones over the last 6 months.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://www.netgate.com/blog/pfsense-2-4-4-release-p3-now-available.html"&gt;pfSense 2.4.4 Release p3 is available&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;We are pleased to announce the release of pfSense® software version 2.4.4-p3, now available for new installations and upgrades!
  pfSense software version 2.4.4-p3 is a maintenance release, bringing a number of security enhancements as well as a handful of fixes for issues present in the 2.4.4-p2 release.
  pfSense 2.4.4-RELEASE-p3 updates and installation images are available now!
  To see a complete list of changes and find more detail, see the Release Notes.
  We had hoped to bring you this release a few days earlier, but given the announcement last Tuesday of the Intel Microarchitectural Data Sampling (MDS) issue, we did not have sufficient time to fully incorporate those corrections and properly test for release on Thursday. We felt that it was worth delaying for a few days, rather than making multiple releases within a week.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade Notes&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Due to the significant nature of the changes in 2.4.4 and later, 
  warnings and error messages, particularly from PHP and package updates, are likely to occur during the upgrade process. In nearly all cases these errors are a harmless side effect of the changes between FreeBSD 11.1 and 11.2 and between PHP 5.6 and PHP 7.2.
  Always take a backup of the firewall configuration prior to any major change to the firewall, such as an upgrade.
  Do not update packages before upgrading pfSense! Either remove all packages or do not update packages before running the upgrade.
  The upgrade will take several minutes to complete. The exact time varies based on download speed, hardware speed, and other factors such installed packages. Be patient during the upgrade and allow the firewall enough time to complete the entire process. After the update packages finish downloading it could take 10-20 minutes or more until the upgrade process ends. The firewall may reboot several times during the upgrade process. Monitor the upgrade from the firewall console for the most accurate view.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://www.netbsd.org/releases/formal-8/NetBSD-8.1.html"&gt;NetBSD 8.1 RC1 is out&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;The NetBSD Project is pleased to announce NetBSD 8.1, the first update of the NetBSD 8 release branch. It represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.&lt;/p&gt;
  
  &lt;p&gt;Some highlights of the 8.1 release are:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;x86: Mitigation for INTEL-SA-00233 (MDS)&lt;/li&gt;

&lt;li&gt;Various local user kernel data leaks fixed.&lt;/li&gt;

&lt;li&gt;x86: new rc.conf(5) setting smtoff to disable Simultaneous Multi-Threading&lt;/li&gt;

&lt;li&gt;Various network driver fixes and improvements.&lt;/li&gt;

&lt;li&gt;Fixes for thread local storage (TLS) in position independent executables (PIE).&lt;/li&gt;

&lt;li&gt;Fixes to reproducible builds.&lt;/li&gt;

&lt;li&gt;Fixed a performance regression in tmpfs.&lt;/li&gt;

&lt;li&gt;DRM/KMS improvements.&lt;/li&gt;

&lt;li&gt;bwfm(4) wireless driver for Broadcom FullMAC PCI and USB devices added.&lt;/li&gt;

&lt;li&gt;Various sh(1) fixes.&lt;/li&gt;

&lt;li&gt;mfii(4) SAS driver added.&lt;/li&gt;

&lt;li&gt;hcpcd(8) updated to 7.2.2&lt;/li&gt;

&lt;li&gt;httpd(8) updated.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/freenas-as-your-server-os/"&gt;FreeNAS as your Server OS&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;What if you could have a server OS that had built in RAID, NAS and SAN functionality, and could manage packages, containers and VMs in a GUI? What if that server OS was also free to download and install? Wouldn’t that be kind of awesome? Wouldn’t that be FreeNAS?
  FreeNAS is the world’s number one, open source storage OS, but it also comes equipped with all the jails, plugins, and VMs you need to run additional server-level services for things like email and web site hosting. File, Block, and even Object storage is all built-in and can be enabled with a few clicks. The ZFS file system scales to more drives than you could ever buy, with no limits for dataset sizes, snapshots, and restores.
  FreeNAS is also 100% FreeBSD. This is the OS used in the Netflix CDN, your PS4, and the basis for iOS. Set up a jail and get started downloading packages like Apache or NGINX for web hosting or Postfix for email service.
  Just released, our new TrueCommand management platform also streamlines alerts and enables multi-system monitoring.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.babaei.net/blog/keep-crashing-daemons-running-on-freebsd/"&gt;Keep Crashing Daemons Running on FreeBSD&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://old.reddit.com/r/freebsd/comments/btksgf/look_what_i_found_today_my_first_set_of_bsd_cds/"&gt;Look what I found today... my first set of BSD CDs...&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://wiki.netbsd.org/security/intel_mds/"&gt;NetBSD - Intel MDS&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091227.html"&gt;FreeBSD 11.3-BETA2 -- Please test!&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Anthony - &lt;a href="http://dpaste.com/33S61HH#wrap"&gt;Question&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Guntbert - &lt;a href="http://dpaste.com/0NDACM2"&gt;Podcast&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Guillaume - &lt;a href="http://dpaste.com/0N3Q9TN"&gt;Another suggestion for Ales from Serbia&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, omniOS, pfsense, p3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>GPU passthrough on bhyve, confusion with used/free disk space on ZFS, OmniOS Community Edition, pfSense 2.4.4 Release p3, NetBSD 8.1 RC1, FreeNAS as your Server OS, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="gpupassthroughreportedworkingonbhyvehttpspassthroughpostgpupassthroughreportedworkingonbhyve"><a href="https://passthroughpo.st/gpu-passthrough-reported-working-on-bhyve/">GPU Passthrough Reported Working on Bhyve</a></h3>

<blockquote>
  <p>Normally we cover news focused on KVM and sometimes Xen, but something very special has happened with their younger cousin in the BSD world, Bhyve.
  For those that don’t know, Bhyve (pronounced bee-hive) is the native hypervisor in FreeBSD. It has many powerful features, but one that’s been a pain point for some years now is VGA passthrough. Consumer GPUs have not been useable until very recently despite limited success with enterprise cards.
  However, Twitter user Michael Yuji found a workaround that enables passing through a consumer card to any *nix system configured to use X11:</p>
</blockquote>

<ul>
<li>https://twitter.com/michael_yuji/status/1127136891365658625</li>
</ul>

<blockquote>
  <p>All you have to do is add a line pointing the X server to the Bus ID of the passed card and the VM will boot, with acceleration and everything. He theorizes that this may not be possible on windows because of the way it looks for display devices, but it’s a solid start.
  As soon as development surrounding VGA passthrough matures on Bhyve, it will become a very attractive alternative to more common tools like Hyper-V and Qemu, because it makes many powerful features available in the host system like jails, boot environments, BSD networking, and tight ZFS integration. For example, you could potentially run your Router, NAS, preferred workstation OS and any number of other things in one box, and only have to spin up a single VM because of the flexibility afforded by jails over Linux-based containers.
  The user who found this workaround also announced they’d be writing it up at some point, so stay tuned for details on the process.
  It’s been slow going on Bhyve passthrough development for a while, but this new revelation is encouraging. We’ll be closely monitoring the situation and report on any other happenings.</p>
  
  <hr />
</blockquote>

<h3 id="confusionwithusedfreediskspaceinzfshttpsoshogbovexilliumorgblog65"><a href="https://oshogbo.vexillium.org/blog/65/">Confusion with used/free disk space in ZFS</a></h3>

<blockquote>
  <p>I use ZFS extensively. ZFS is my favorite file system. I write articles and give lectures about it. I work with it every day. In traditional file systems we use df(1) to determine free space on partitions. We can also use du(1) to count the size of the files in the directory. But it’s different on ZFS and this is the most confusing thing EVER. I always forget which tool reports what disk space usage! Every time somebody asks me, I need to google it. For this reason I decided to document it here - for myself - because if I can’t remember it at least I will not need to google it, as it will be on my blog, but maybe you will also benefit from this blog post if you have the same problem or you are starting your journey with ZFS.</p>
  
  <p>The understanding of how ZFS is uses space and how to determine which value means what is a crucial thing. I hope thanks to this article I will finally remember it!</p>
</blockquote>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="omnioscommunityeditionhttpsomniosceorgarticlerelease030html"><a href="https://omniosce.org/article/release-030.html">OmniOS Community Edition</a></h3>

<blockquote>
  <p>The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.
  OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.
  This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.
  If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.
  The OmniOS team and the illumos community have been very active in creating new features and improving existing ones over the last 6 months.</p>
</blockquote>

<p><hr /></p>

<h3 id="pfsense244releasep3isavailablehttpswwwnetgatecomblogpfsense244releasep3nowavailablehtml"><a href="https://www.netgate.com/blog/pfsense-2-4-4-release-p3-now-available.html">pfSense 2.4.4 Release p3 is available</a></h3>

<blockquote>
  <p>We are pleased to announce the release of pfSense® software version 2.4.4-p3, now available for new installations and upgrades!
  pfSense software version 2.4.4-p3 is a maintenance release, bringing a number of security enhancements as well as a handful of fixes for issues present in the 2.4.4-p2 release.
  pfSense 2.4.4-RELEASE-p3 updates and installation images are available now!
  To see a complete list of changes and find more detail, see the Release Notes.
  We had hoped to bring you this release a few days earlier, but given the announcement last Tuesday of the Intel Microarchitectural Data Sampling (MDS) issue, we did not have sufficient time to fully incorporate those corrections and properly test for release on Thursday. We felt that it was worth delaying for a few days, rather than making multiple releases within a week.</p>
</blockquote>

<ul>
<li>Upgrade Notes</li>
</ul>

<blockquote>
  <p>Due to the significant nature of the changes in 2.4.4 and later, 
  warnings and error messages, particularly from PHP and package updates, are likely to occur during the upgrade process. In nearly all cases these errors are a harmless side effect of the changes between FreeBSD 11.1 and 11.2 and between PHP 5.6 and PHP 7.2.
  Always take a backup of the firewall configuration prior to any major change to the firewall, such as an upgrade.
  Do not update packages before upgrading pfSense! Either remove all packages or do not update packages before running the upgrade.
  The upgrade will take several minutes to complete. The exact time varies based on download speed, hardware speed, and other factors such installed packages. Be patient during the upgrade and allow the firewall enough time to complete the entire process. After the update packages finish downloading it could take 10-20 minutes or more until the upgrade process ends. The firewall may reboot several times during the upgrade process. Monitor the upgrade from the firewall console for the most accurate view.</p>
</blockquote>

<p><hr /></p>

<h3 id="netbsd81rc1isouthttpswwwnetbsdorgreleasesformal8netbsd81html"><a href="https://www.netbsd.org/releases/formal-8/NetBSD-8.1.html">NetBSD 8.1 RC1 is out</a></h3>

<blockquote>
  <p>The NetBSD Project is pleased to announce NetBSD 8.1, the first update of the NetBSD 8 release branch. It represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.</p>
  
  <p>Some highlights of the 8.1 release are:</p>
</blockquote>

<ul>
<li>x86: Mitigation for INTEL-SA-00233 (MDS)</li>

<li>Various local user kernel data leaks fixed.</li>

<li>x86: new rc.conf(5) setting smtoff to disable Simultaneous Multi-Threading</li>

<li>Various network driver fixes and improvements.</li>

<li>Fixes for thread local storage (TLS) in position independent executables (PIE).</li>

<li>Fixes to reproducible builds.</li>

<li>Fixed a performance regression in tmpfs.</li>

<li>DRM/KMS improvements.</li>

<li>bwfm(4) wireless driver for Broadcom FullMAC PCI and USB devices added.</li>

<li>Various sh(1) fixes.</li>

<li>mfii(4) SAS driver added.</li>

<li>hcpcd(8) updated to 7.2.2</li>

<li>httpd(8) updated.</li>
</ul>

<p><hr /></p>

<h3 id="freenasasyourserveroshttpswwwixsystemscomblogfreenasasyourserveros"><a href="https://www.ixsystems.com/blog/freenas-as-your-server-os/">FreeNAS as your Server OS</a></h3>

<blockquote>
  <p>What if you could have a server OS that had built in RAID, NAS and SAN functionality, and could manage packages, containers and VMs in a GUI? What if that server OS was also free to download and install? Wouldn’t that be kind of awesome? Wouldn’t that be FreeNAS?
  FreeNAS is the world’s number one, open source storage OS, but it also comes equipped with all the jails, plugins, and VMs you need to run additional server-level services for things like email and web site hosting. File, Block, and even Object storage is all built-in and can be enabled with a few clicks. The ZFS file system scales to more drives than you could ever buy, with no limits for dataset sizes, snapshots, and restores.
  FreeNAS is also 100% FreeBSD. This is the OS used in the Netflix CDN, your PS4, and the basis for iOS. Set up a jail and get started downloading packages like Apache or NGINX for web hosting or Postfix for email service.
  Just released, our new TrueCommand management platform also streamlines alerts and enables multi-system monitoring.</p>
</blockquote>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://www.babaei.net/blog/keep-crashing-daemons-running-on-freebsd/">Keep Crashing Daemons Running on FreeBSD</a></li>

<li><a href="https://old.reddit.com/r/freebsd/comments/btksgf/look_what_i_found_today_my_first_set_of_bsd_cds/">Look what I found today... my first set of BSD CDs...</a></li>

<li><a href="https://wiki.netbsd.org/security/intel_mds/">NetBSD - Intel MDS</a></li>

<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091227.html">FreeBSD 11.3-BETA2 -- Please test!</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Anthony - <a href="http://dpaste.com/33S61HH#wrap">Question</a></li>

<li>Guntbert - <a href="http://dpaste.com/0NDACM2">Podcast</a></li>

<li>Guillaume - <a href="http://dpaste.com/0N3Q9TN">Another suggestion for Ales from Serbia</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0301.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>GPU passthrough on bhyve, confusion with used/free disk space on ZFS, OmniOS Community Edition, pfSense 2.4.4 Release p3, NetBSD 8.1 RC1, FreeNAS as your Server OS, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="gpupassthroughreportedworkingonbhyvehttpspassthroughpostgpupassthroughreportedworkingonbhyve"><a href="https://passthroughpo.st/gpu-passthrough-reported-working-on-bhyve/">GPU Passthrough Reported Working on Bhyve</a></h3>

<blockquote>
  <p>Normally we cover news focused on KVM and sometimes Xen, but something very special has happened with their younger cousin in the BSD world, Bhyve.
  For those that don’t know, Bhyve (pronounced bee-hive) is the native hypervisor in FreeBSD. It has many powerful features, but one that’s been a pain point for some years now is VGA passthrough. Consumer GPUs have not been useable until very recently despite limited success with enterprise cards.
  However, Twitter user Michael Yuji found a workaround that enables passing through a consumer card to any *nix system configured to use X11:</p>
</blockquote>

<ul>
<li>https://twitter.com/michael_yuji/status/1127136891365658625</li>
</ul>

<blockquote>
  <p>All you have to do is add a line pointing the X server to the Bus ID of the passed card and the VM will boot, with acceleration and everything. He theorizes that this may not be possible on windows because of the way it looks for display devices, but it’s a solid start.
  As soon as development surrounding VGA passthrough matures on Bhyve, it will become a very attractive alternative to more common tools like Hyper-V and Qemu, because it makes many powerful features available in the host system like jails, boot environments, BSD networking, and tight ZFS integration. For example, you could potentially run your Router, NAS, preferred workstation OS and any number of other things in one box, and only have to spin up a single VM because of the flexibility afforded by jails over Linux-based containers.
  The user who found this workaround also announced they’d be writing it up at some point, so stay tuned for details on the process.
  It’s been slow going on Bhyve passthrough development for a while, but this new revelation is encouraging. We’ll be closely monitoring the situation and report on any other happenings.</p>
  
  <hr />
</blockquote>

<h3 id="confusionwithusedfreediskspaceinzfshttpsoshogbovexilliumorgblog65"><a href="https://oshogbo.vexillium.org/blog/65/">Confusion with used/free disk space in ZFS</a></h3>

<blockquote>
  <p>I use ZFS extensively. ZFS is my favorite file system. I write articles and give lectures about it. I work with it every day. In traditional file systems we use df(1) to determine free space on partitions. We can also use du(1) to count the size of the files in the directory. But it’s different on ZFS and this is the most confusing thing EVER. I always forget which tool reports what disk space usage! Every time somebody asks me, I need to google it. For this reason I decided to document it here - for myself - because if I can’t remember it at least I will not need to google it, as it will be on my blog, but maybe you will also benefit from this blog post if you have the same problem or you are starting your journey with ZFS.</p>
  
  <p>The understanding of how ZFS is uses space and how to determine which value means what is a crucial thing. I hope thanks to this article I will finally remember it!</p>
</blockquote>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="omnioscommunityeditionhttpsomniosceorgarticlerelease030html"><a href="https://omniosce.org/article/release-030.html">OmniOS Community Edition</a></h3>

<blockquote>
  <p>The OmniOS Community Edition Association is proud to announce the general availability of OmniOS - r151030.
  OmniOS is published according to a 6-month release cycle, r151030 LTS takes over from r151028, published in November 2018; and since it is a LTS release it also takes over from r151022. The r151030 LTS release will be supported for 3 Years. It is the first LTS release published by the OmniOS CE Association since taking over the reins from OmniTI in 2017. The next LTS release is scheduled for May 2021. The old stable r151026 release is now end-of-life. See the release schedule for further details.
  This is only a small selection of the new features, and bug fixes in the new release; review the release notes for full details.
  If you upgrade from r22 and want to see all new features added since then, make sure to also read the release notes for r24, r26 and r28.
  The OmniOS team and the illumos community have been very active in creating new features and improving existing ones over the last 6 months.</p>
</blockquote>

<p><hr /></p>

<h3 id="pfsense244releasep3isavailablehttpswwwnetgatecomblogpfsense244releasep3nowavailablehtml"><a href="https://www.netgate.com/blog/pfsense-2-4-4-release-p3-now-available.html">pfSense 2.4.4 Release p3 is available</a></h3>

<blockquote>
  <p>We are pleased to announce the release of pfSense® software version 2.4.4-p3, now available for new installations and upgrades!
  pfSense software version 2.4.4-p3 is a maintenance release, bringing a number of security enhancements as well as a handful of fixes for issues present in the 2.4.4-p2 release.
  pfSense 2.4.4-RELEASE-p3 updates and installation images are available now!
  To see a complete list of changes and find more detail, see the Release Notes.
  We had hoped to bring you this release a few days earlier, but given the announcement last Tuesday of the Intel Microarchitectural Data Sampling (MDS) issue, we did not have sufficient time to fully incorporate those corrections and properly test for release on Thursday. We felt that it was worth delaying for a few days, rather than making multiple releases within a week.</p>
</blockquote>

<ul>
<li>Upgrade Notes</li>
</ul>

<blockquote>
  <p>Due to the significant nature of the changes in 2.4.4 and later, 
  warnings and error messages, particularly from PHP and package updates, are likely to occur during the upgrade process. In nearly all cases these errors are a harmless side effect of the changes between FreeBSD 11.1 and 11.2 and between PHP 5.6 and PHP 7.2.
  Always take a backup of the firewall configuration prior to any major change to the firewall, such as an upgrade.
  Do not update packages before upgrading pfSense! Either remove all packages or do not update packages before running the upgrade.
  The upgrade will take several minutes to complete. The exact time varies based on download speed, hardware speed, and other factors such installed packages. Be patient during the upgrade and allow the firewall enough time to complete the entire process. After the update packages finish downloading it could take 10-20 minutes or more until the upgrade process ends. The firewall may reboot several times during the upgrade process. Monitor the upgrade from the firewall console for the most accurate view.</p>
</blockquote>

<p><hr /></p>

<h3 id="netbsd81rc1isouthttpswwwnetbsdorgreleasesformal8netbsd81html"><a href="https://www.netbsd.org/releases/formal-8/NetBSD-8.1.html">NetBSD 8.1 RC1 is out</a></h3>

<blockquote>
  <p>The NetBSD Project is pleased to announce NetBSD 8.1, the first update of the NetBSD 8 release branch. It represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.</p>
  
  <p>Some highlights of the 8.1 release are:</p>
</blockquote>

<ul>
<li>x86: Mitigation for INTEL-SA-00233 (MDS)</li>

<li>Various local user kernel data leaks fixed.</li>

<li>x86: new rc.conf(5) setting smtoff to disable Simultaneous Multi-Threading</li>

<li>Various network driver fixes and improvements.</li>

<li>Fixes for thread local storage (TLS) in position independent executables (PIE).</li>

<li>Fixes to reproducible builds.</li>

<li>Fixed a performance regression in tmpfs.</li>

<li>DRM/KMS improvements.</li>

<li>bwfm(4) wireless driver for Broadcom FullMAC PCI and USB devices added.</li>

<li>Various sh(1) fixes.</li>

<li>mfii(4) SAS driver added.</li>

<li>hcpcd(8) updated to 7.2.2</li>

<li>httpd(8) updated.</li>
</ul>

<p><hr /></p>

<h3 id="freenasasyourserveroshttpswwwixsystemscomblogfreenasasyourserveros"><a href="https://www.ixsystems.com/blog/freenas-as-your-server-os/">FreeNAS as your Server OS</a></h3>

<blockquote>
  <p>What if you could have a server OS that had built in RAID, NAS and SAN functionality, and could manage packages, containers and VMs in a GUI? What if that server OS was also free to download and install? Wouldn’t that be kind of awesome? Wouldn’t that be FreeNAS?
  FreeNAS is the world’s number one, open source storage OS, but it also comes equipped with all the jails, plugins, and VMs you need to run additional server-level services for things like email and web site hosting. File, Block, and even Object storage is all built-in and can be enabled with a few clicks. The ZFS file system scales to more drives than you could ever buy, with no limits for dataset sizes, snapshots, and restores.
  FreeNAS is also 100% FreeBSD. This is the OS used in the Netflix CDN, your PS4, and the basis for iOS. Set up a jail and get started downloading packages like Apache or NGINX for web hosting or Postfix for email service.
  Just released, our new TrueCommand management platform also streamlines alerts and enables multi-system monitoring.</p>
</blockquote>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://www.babaei.net/blog/keep-crashing-daemons-running-on-freebsd/">Keep Crashing Daemons Running on FreeBSD</a></li>

<li><a href="https://old.reddit.com/r/freebsd/comments/btksgf/look_what_i_found_today_my_first_set_of_bsd_cds/">Look what I found today... my first set of BSD CDs...</a></li>

<li><a href="https://wiki.netbsd.org/security/intel_mds/">NetBSD - Intel MDS</a></li>

<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-May/091227.html">FreeBSD 11.3-BETA2 -- Please test!</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Anthony - <a href="http://dpaste.com/33S61HH#wrap">Question</a></li>

<li>Guntbert - <a href="http://dpaste.com/0NDACM2">Podcast</a></li>

<li>Guillaume - <a href="http://dpaste.com/0N3Q9TN">Another suggestion for Ales from Serbia</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0301.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>103: Ubuntu Slaughters Kittens</title>
  <link>https://www.bsdnow.tv/103</link>
  <guid isPermaLink="false">227b2929-398f-4d82-b29d-80981ddcc4d7</guid>
  <pubDate>Wed, 19 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/227b2929-398f-4d82-b29d-80981ddcc4d7.mp3" length="86734228" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</itunes:subtitle>
  <itunes:duration>2:00:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Interview - Bryan Cantrill - bryan@joyent.com (mailto:bryan@joyent.com) / @bcantrill (https://twitter.com/bcantrill)
BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)
Feedback/Questions
Randy writes in (http://slexy.org/view/s2b6dA7fAr)
Jared writes in (http://slexy.org/view/s2vABMHiok)
Steve writes in (http://slexy.org/view/s2194ADVUL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, multipath, tcp, performance, dtrace, zfs, illumos, opensolaris, solaris, joyent, pkgsrc, omnios</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>100: Straight from the Src</title>
  <link>https://www.bsdnow.tv/100</link>
  <guid isPermaLink="false">06d71c41-6630-4fa3-8cd3-46e35a9a535c</guid>
  <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06d71c41-6630-4fa3-8cd3-46e35a9a535c.mp3" length="53030452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</itunes:subtitle>
  <itunes:duration>1:13:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Remote DoS in the TCP stack (https://blog.team-cymru.org/2015/07/another-day-another-patch/)
A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing remote attackers to exhaust the resources of a system with nothing more than TCP connections
While in the LAST_ACK state, which is one of the final stages of a connection's lifetime, the connection can get stuck and hang there indefinitely
This problem has a slightly confusing history that involves different fixes at different points in time from different people
Juniper originally discovered the bug and announced a fix (https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=JSA10686) for their proprietary networking gear on June 8th
On June 29th, FreeBSD caught wind of it and fixed the bug in their -current branch (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=284941&amp;amp;r2=284940&amp;amp;pathrev=284941), but did not issue a security notice or MFC the fix back to the -stable branches
On July 13th, two weeks later, OpenBSD fixed the issue (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143682919807388&amp;amp;w=2) in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found
Immediately afterwards, they merged it back to -stable and issued an errata notice (http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig) for 5.7 and 5.6
On July 21st, three weeks after their original fix, FreeBSD committed yet another slightly different fix (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=285777&amp;amp;r2=285776&amp;amp;pathrev=285777) and issued a security notice (https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html) for the problem (which didn't include the first fix)
After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way
NetBSD confirmed they were vulnerable too, and applied another completely different fix (http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&amp;amp;r2=1.184&amp;amp;only_with_tag=MAIN) to -current on July 24th, but haven't released a security notice yet
DragonFly is also investigating the issue now to see if they're affected as well
***
c2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150721180312&amp;amp;mode=flat)
Reports from OpenBSD's latest hackathon (http://www.openbsd.org/hackathons.html), held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)
The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event
He writes, "Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the "command" built-in command - and had to step through dozens of false positives with the less '/' and 'n' search keys before you finally found the actual definition?"
With mandoc's new internal jump targets, this is a problem of the past now
Jasper also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150723124332&amp;amp;mode=flat), doing his usual work with Puppet (and specifically "Facter," a tool used by Puppet to gather various bits of system information)
Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an "-i" flag for sed (hooray!)
Antoine Jacoutot gave a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722205349&amp;amp;mode=flat) on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)
It now has an "ls" subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this "the poor man's service monitoring tool")
He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)
His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades
Foundation director Ken Westerback was also there (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722105658&amp;amp;mode=flat), getting some disk-related and laptop work done
He cleaned up and committed the 4k sector softraid code that he'd been working on, as well as fixing some trackpad issues
Stefan Sperling, OpenBSD's token "wireless guy," had a lot to say (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722182236&amp;amp;mode=flat) about the hackathon and what he did there (and even sent in his write-up before he got home)
He taught tcpdump about some new things, including 802.11n metadata beacons (there's a lot more specific detail about this one in the report)
Bringing a bag full of USB wireless devices with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work
One quote from Stefan's report that a lot of people seem to be talking about: "Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We'll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year."
Jeremy Evans wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725180527&amp;amp;mode=flat) to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem
While he's mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon
Rafael Zalamena, who got commit access at the event, gives his very first report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725183439&amp;amp;mode=flat) on his networking-related hackathon activities
With Rafael's diffs and help from a couple other developers, OpenBSD now has support for VPLS (https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service)
Jonathan Gray got a lot done (http://undeadly.org/cgi?action=article&amp;amp;sid=20150728184743&amp;amp;mode=flat) in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code
As he's become somewhat known for, Jonathan was also busy running three things in the background: clang's fuzzer, cppcheck and AFL (looking for any potential crashes to fix)
Martin Pieuchot gave an write-up (http://undeadly.org/cgi?action=article&amp;amp;sid=20150724183210&amp;amp;mode=flat) on his experience: "I always though that hackathons were the best place to write code, but what's even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that's what I did."
He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack
Unfortunately, most of Martin's secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle
We're still eagerly awaiting a report from one of OpenBSD's newest developers (https://twitter.com/phessler/status/623291827878137856), Alexandr Nedvedicky (the Oracle guy who's working on SMP PF and some other PF fixes)
OpenBSD 5.8's "beta" status was recently reverted, with the message "take that as a hint (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143766883514831&amp;amp;w=2)," so that may mean more big changes are still to come...
***
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2015-04-2015-06.html)
FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far
It's broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others
Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just "svn.freebsd.org") are now using GeoGNS with official SSL certs and general redundancy was increased
In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages
The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon
Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)
The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support
Multipath TCP was also a hot topic, and there's a brief summary of the current status on that patch (it will be available publicly soon)
ZFSguru, a project we haven't talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August
PCIe hotplug support is also mentioned, though it's still in the development stages (basic hot-swap functions are working though)
The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling
Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report
Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot
Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***
The OpenSSH bug that wasn't (http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html)
There's been a lot of discussion (https://www.marc.info/?t=143766048000005&amp;amp;r=1&amp;amp;w=2) about a supposed flaw (https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/) in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)
There's no actual exploit to speak of; this bug would only help someone get more bruteforce tries in with a fewer number of connections (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html)
FreeBSD in its default configuration, with PAM (https://en.wikipedia.org/wiki/Pluggable_authentication_module) and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - not upstream OpenSSH (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143767296016252&amp;amp;w=2), nor any of the other BSDs, and not even the majority of Linux distros
If you disable all forms of authentication except public keys, like you're supposed to (https://stribika.github.io/2015/01/04/secure-secure-shell.html), then this is also not a big deal for FreeBSD systems
Realistically speaking, it's more of a PAM bug (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143782167322500&amp;amp;w=2) than anything else
OpenSSH added an additional check (https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab) for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can run freebsd-update (https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html))
***
Interview - Sebastian Wiedenroth - wiedi@netbsd.org (mailto:wiedi@netbsd.org) / @wied0r (https://twitter.com/wied0r)
pkgsrc (https://en.wikipedia.org/wiki/Pkgsrc) and pkgsrcCon (http://pkgsrc.org/pkgsrcCon/)
News Roundup
Now served by OpenBSD (https://tribaal.io/this-now-served-by-openbsd.html)
We've mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it
The use case for the author was for a webserver, so he decided to try out the httpd in base
Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting
TLS 1.2 by default, strong ciphers with LibreSSL and HSTS (https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) combined give you a pretty secure web server
***
FreeBSD laptop playbooks (https://github.com/sean-/freebsd-laptops)
A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named "freebsd-laptops"
It's based on ansible, and uses the playbook format for automatic set up and configuration
Right now, it's only working on a single Lenovo laptop, but the plan is to add instructions for many more models
Check the Github page for instructions on how to get started, and maybe get involved if you're running FreeBSD on a laptop
***
NetBSD on the NVIDIA Jetson TK1 (https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson)
If you've never heard of the Jetson TK1 (https://developer.nvidia.com/jetson-tk1), we can go ahead and spoil the secret here: NetBSD runs on it
As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE
This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)
You can even run X11 on it, pretty sweet
***
DragonFly power mangement options (http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html)
DragonFly developer Sepherosa, who we've had on the show, has been doing some ACPI work over there
In this email, he presents some of DragonFly's different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well
He also did some testing with each of them and gave his findings about power saving
If you've been thinking about running DragonFly on a laptop, this would be a good one to read
***
OpenBSD router under FreeBSD bhyve (https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/)
If one BSD just isn't enough for you, and you've only got one machine, why not run two at once
This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it
If you've been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware
The author also includes a little bit of history on how he got into both operating systems
There are lots of mixed opinions about virtualizing core network components, so we'll leave it up to you to do your research
Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***
Feedback/Questions
Kevin writes in (http://slexy.org/view/s2yPVV5Wyp)
Logan writes in (http://slexy.org/view/s21zcz9rut)
Peter writes in (http://slexy.org/view/s21CRmiPwK)
Randy writes in (http://slexy.org/view/s211zfIXff)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, pkgsrccon, portability, illumos, solaris, openindiana, opensolaris, zfs, openzfs, tcp, dos, c2k15, hackathon, openssh, pam, exploit, smartos, omnios, joyent, delphix</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>77: Noah's L2ARC</title>
  <link>https://www.bsdnow.tv/77</link>
  <guid isPermaLink="false">7f831a01-7c9e-48e5-8400-717e0198fc07</guid>
  <pubDate>Wed, 18 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7f831a01-7c9e-48e5-8400-717e0198fc07.mp3" length="62093524" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be chatting with Alex Reece and Matt Ahrens about what's new in the world of OpenZFS. After that, we're starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be chatting with Alex Reece and Matt Ahrens about what's new in the world of OpenZFS. After that, we're starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Revisiting FreeBSD after 20 years (http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years)
With comments like "has Linux lost its way?" floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades
This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time
He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL
On the topic of jails, he summarizes: "Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time."
The post also goes through the "just plain different" aspects of a complete OS vs. a distribution of various things pieced together
Finally, he includes some things he wasn't so happy about: subpar laptop support, virtualization being a bit behind, a myriad of complaints about pkgng and a few other things
There was some decent discussion (https://news.ycombinator.com/item?id=9063216) on Hacker News about this article too, with counterpoints from both sides
***
s2k15 hackathon report: network stack SMP (http://undeadly.org/cgi?action=article&amp;amp;sid=20150218085759)
The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted
One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack
If you're not familiar with him, he gave a presentation (http://www.openbsd.org/papers/tamingdragons.pdf) at EuroBSDCon last year, titled Taming OpenBSD Network Stack Dragons (https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4)
Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the big lock (https://en.wikipedia.org/wiki/Giant_lock)
Hopefully more trip reports will be sent in during the coming weeks
Most of the big code changes should probably appear after the 5.7-release testing period
***
From BIND to NSD and Unbound (https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/)
If you've been running a DNS server on any of the BSDs, you've probably noticed a semi-recent trend: BIND being replaced with Unbound
BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative
OpenBSD goes a step further, also including NSD in the base system, whereas you'll need to install that from ports on FreeBSD
Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons 
This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound
All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***
m0n0wall calls it quits (http://m0n0.ch/wall/end_announcement.php)
The original, classic BSD firewall distribution m0n0wall (https://en.wikipedia.org/wiki/M0n0wall) has finally decided to close up shop
For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or even a floppy disk
It started over twelve years ago, which is pretty amazing when you consider that's around half of FreeBSD itself's lifespan
The project was probably a lot of people's first encounter with BSD in any form
If you were a m0n0wall user, fear not, you've got plenty of choices for a potential replacement: doing it yourself with something like FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/) or OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router), or going the premade route with something like pfSense (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense), OPNsense (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) or the BSD Router Project (http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router)
The founder's announcement includes these closing words: "m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can."
While m0n0wall didn't get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***
Interview - Alex Reece &amp;amp; Matt Ahrens - alex@delphix.com (mailto:alex@delphix.com) &amp;amp; matt@delphix.com (mailto:matt@delphix.com) / @openzfs (https://twitter.com/openzfs)
What's new in OpenZFS
Tutorial
Making your first patch (OpenBSD) (http://www.bsdnow.tv/tutorials/patching-obsd)
News Roundup
Overlaying remote LANs with OpenBSD's VXLAN (http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans)
Have you ever wanted to "merge" multiple remote LANs? OpenBSD's vxlan(4) (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4) is exactly what you need
This article talks about using it to connect two virtualized infrastructures on different ESXi servers
It gives a bit of networking background first, in case you're not quite up to speed on all this stuff
This tool opens up a lot of very cool possibilities, even possibly doing a "remote" LAN party
Be sure to check the AsiaBSDCon talk (https://www.youtube.com/watch?v=ufeEP_hzFN0) about VXLANs if you haven't already
***
2020, year of the PCBSD desktop (http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html)
Here we have a blog post about BSD on the desktop, straight from a KDE developer
He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux's desktop market share (small as it may be)
With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option
ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one
There was also some discussion on Slashdot (http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth) that might be worth reading
***
OpenSSH host key rotation, redux (http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html)
We mentioned the new OpenSSH host key rotation and other goodies in a previous episode (http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1), but things have changed a little bit since then
djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) says "almost immediately after smugly declaring 'mission accomplished', the bug reports started rolling in."
There were some initial complaints from developers about the new options, and a serious bug shortly thereafter
After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests
Most importantly, the bigger big fix was described as: "a malicious server (say, "host-a") could advertise the public key of another server (say, "host-b"). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide."
None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***
PCBSD tries out LibreSSL (https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e)
PCBSD users may soon be seeing a lot less security problems because of two recent changes
After switching over to OpenNTPD last week (http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change), PCBSD decides to give the portable LibreSSL (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl) a try too
Note that this is only for the packages built from ports, not the base system unfortunately
They're not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD's ports are built against it
A good number of patches (https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb) are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla
Look forward to Kris wearing a "keep calm and abandon OpenSSL (https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&amp;amp;state=item&amp;amp;dept_id=01&amp;amp;sub_dept_id=01&amp;amp;product_id=TSHIRTOSSL)" shirt in the near future
***
Feedback/Questions
Benjamin writes in (http://slexy.org/view/s28nyJ5omV)
Mike writes in (http://slexy.org/view/s2wYUmUmh0)
Brad writes in (http://slexy.org/view/s2BAKAQvMt)
***
Mailing List Gold
Debian (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html) Dejavu (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html)
Package gone missing (http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, raid, openzfs, illumos, solaris, openindiana, opensolaris, omnios, smartos, m0n0wall, opnsense, rng, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Alex Reece and Matt Ahrens about what&#39;s new in the world of OpenZFS. After that, we&#39;re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years" rel="nofollow">Revisiting FreeBSD after 20 years</a></h3>

<ul>
<li>With comments like &quot;has Linux lost its way?&quot; floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades</li>
<li>This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time</li>
<li>He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL</li>
<li>On the topic of jails, he summarizes: &quot;Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time.&quot;</li>
<li>The post also goes through the &quot;just plain different&quot; aspects of a complete OS vs. a distribution of various things pieced together</li>
<li>Finally, he includes some things he wasn&#39;t so happy about: subpar laptop support, virtualization being a bit behind, a <em>myriad</em> of complaints about pkgng and a few other things</li>
<li>There was some <a href="https://news.ycombinator.com/item?id=9063216" rel="nofollow">decent discussion</a> on Hacker News about this article too, with counterpoints from both sides
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150218085759" rel="nofollow">s2k15 hackathon report: network stack SMP</a></h3>

<ul>
<li>The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted</li>
<li>One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack</li>
<li>If you&#39;re not familiar with him, he gave a <a href="http://www.openbsd.org/papers/tamingdragons.pdf" rel="nofollow">presentation</a> at EuroBSDCon last year, titled <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a></li>
<li>Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the <a href="https://en.wikipedia.org/wiki/Giant_lock" rel="nofollow">big lock</a></li>
<li>Hopefully more trip reports will be sent in during the coming weeks</li>
<li>Most of the big code changes should probably appear after the 5.7-release testing period
***</li>
</ul>

<h3><a href="https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/" rel="nofollow">From BIND to NSD and Unbound</a></h3>

<ul>
<li>If you&#39;ve been running a DNS server on any of the BSDs, you&#39;ve probably noticed a semi-recent trend: BIND being replaced with Unbound</li>
<li>BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative</li>
<li>OpenBSD goes a step further, also including NSD in the base system, whereas you&#39;ll need to install that from ports on FreeBSD</li>
<li>Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons </li>
<li>This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound</li>
<li>All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/end_announcement.php" rel="nofollow">m0n0wall calls it quits</a></h3>

<ul>
<li>The original, classic BSD firewall distribution <a href="https://en.wikipedia.org/wiki/M0n0wall" rel="nofollow">m0n0wall</a> has finally decided to close up shop</li>
<li>For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or <strong>even a floppy disk</strong></li>
<li>It started over twelve years ago, which is pretty amazing when you consider that&#39;s around half of FreeBSD itself&#39;s lifespan</li>
<li>The project was probably a lot of people&#39;s first encounter with BSD in any form</li>
<li>If you were a m0n0wall user, fear not, you&#39;ve got <em>plenty</em> of choices for a potential replacement: doing it yourself with something like <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a>, or going the premade route with something like <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a>, <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> or the <a href="http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router" rel="nofollow">BSD Router Project</a></li>
<li>The founder&#39;s announcement includes these closing words: &quot;m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can.&quot;</li>
<li>While m0n0wall didn&#39;t get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***</li>
</ul>

<h2>Interview - Alex Reece &amp; Matt Ahrens - <a href="mailto:alex@delphix.com" rel="nofollow">alex@delphix.com</a> &amp; <a href="mailto:matt@delphix.com" rel="nofollow">matt@delphix.com</a> / <a href="https://twitter.com/openzfs" rel="nofollow">@openzfs</a></h2>

<p>What&#39;s new in OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/patching-obsd" rel="nofollow">Making your first patch (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans" rel="nofollow">Overlaying remote LANs with OpenBSD&#39;s VXLAN</a></h3>

<ul>
<li>Have you ever wanted to &quot;merge&quot; multiple remote LANs? OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4" rel="nofollow">vxlan(4)</a> is exactly what you need</li>
<li>This article talks about using it to connect two virtualized infrastructures on different ESXi servers</li>
<li>It gives a bit of networking background first, in case you&#39;re not quite up to speed on all this stuff</li>
<li>This tool opens up a lot of very cool possibilities, even possibly doing a &quot;remote&quot; LAN party</li>
<li>Be sure to check the <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">AsiaBSDCon talk</a> about VXLANs if you haven&#39;t already
***</li>
</ul>

<h3><a href="http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html" rel="nofollow">2020, year of the PCBSD desktop</a></h3>

<ul>
<li>Here we have a blog post about BSD on the desktop, straight from a KDE developer</li>
<li>He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux&#39;s desktop market share (small as it may be)</li>
<li>With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option</li>
<li>ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one</li>
<li>There was also some <a href="http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth" rel="nofollow">discussion on Slashdot</a> that might be worth reading
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html" rel="nofollow">OpenSSH host key rotation, redux</a></h3>

<ul>
<li>We mentioned the new OpenSSH host key rotation and other goodies in <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">a previous episode</a>, but things have changed a little bit since then</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">djm</a> says &quot;almost immediately after smugly declaring &#39;mission accomplished&#39;, the bug reports started rolling in.&quot;</li>
<li>There were some initial complaints from developers about the new options, and a serious bug shortly thereafter</li>
<li>After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests</li>
<li>Most importantly, the bigger big fix was described as: &quot;a malicious server (say, &quot;host-a&quot;) could advertise the public key of another server (say, &quot;host-b&quot;). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide.&quot;</li>
<li>None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e" rel="nofollow">PCBSD tries out LibreSSL</a></h3>

<ul>
<li>PCBSD users may soon be seeing a lot less security problems because of two recent changes</li>
<li>After switching over to OpenNTPD <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">last week</a>, PCBSD decides to give the <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">portable LibreSSL</a> a try too</li>
<li>Note that this is only for the packages built from ports, not the base system unfortunately</li>
<li>They&#39;re not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD&#39;s ports are built against it</li>
<li>A good <a href="https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb" rel="nofollow">number of patches</a> are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla</li>
<li>Look forward to Kris wearing a &quot;<a href="https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&state=item&dept_id=01&sub_dept_id=01&product_id=TSHIRTOSSL" rel="nofollow">keep calm and abandon OpenSSL</a>&quot; shirt in the near future
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28nyJ5omV" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s2wYUmUmh0" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s2BAKAQvMt" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html" rel="nofollow">Debian</a> <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html" rel="nofollow">Dejavu</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html" rel="nofollow">Package gone missing</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Alex Reece and Matt Ahrens about what&#39;s new in the world of OpenZFS. After that, we&#39;re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years" rel="nofollow">Revisiting FreeBSD after 20 years</a></h3>

<ul>
<li>With comments like &quot;has Linux lost its way?&quot; floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades</li>
<li>This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time</li>
<li>He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL</li>
<li>On the topic of jails, he summarizes: &quot;Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time.&quot;</li>
<li>The post also goes through the &quot;just plain different&quot; aspects of a complete OS vs. a distribution of various things pieced together</li>
<li>Finally, he includes some things he wasn&#39;t so happy about: subpar laptop support, virtualization being a bit behind, a <em>myriad</em> of complaints about pkgng and a few other things</li>
<li>There was some <a href="https://news.ycombinator.com/item?id=9063216" rel="nofollow">decent discussion</a> on Hacker News about this article too, with counterpoints from both sides
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150218085759" rel="nofollow">s2k15 hackathon report: network stack SMP</a></h3>

<ul>
<li>The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted</li>
<li>One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack</li>
<li>If you&#39;re not familiar with him, he gave a <a href="http://www.openbsd.org/papers/tamingdragons.pdf" rel="nofollow">presentation</a> at EuroBSDCon last year, titled <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a></li>
<li>Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the <a href="https://en.wikipedia.org/wiki/Giant_lock" rel="nofollow">big lock</a></li>
<li>Hopefully more trip reports will be sent in during the coming weeks</li>
<li>Most of the big code changes should probably appear after the 5.7-release testing period
***</li>
</ul>

<h3><a href="https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/" rel="nofollow">From BIND to NSD and Unbound</a></h3>

<ul>
<li>If you&#39;ve been running a DNS server on any of the BSDs, you&#39;ve probably noticed a semi-recent trend: BIND being replaced with Unbound</li>
<li>BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative</li>
<li>OpenBSD goes a step further, also including NSD in the base system, whereas you&#39;ll need to install that from ports on FreeBSD</li>
<li>Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons </li>
<li>This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound</li>
<li>All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/end_announcement.php" rel="nofollow">m0n0wall calls it quits</a></h3>

<ul>
<li>The original, classic BSD firewall distribution <a href="https://en.wikipedia.org/wiki/M0n0wall" rel="nofollow">m0n0wall</a> has finally decided to close up shop</li>
<li>For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or <strong>even a floppy disk</strong></li>
<li>It started over twelve years ago, which is pretty amazing when you consider that&#39;s around half of FreeBSD itself&#39;s lifespan</li>
<li>The project was probably a lot of people&#39;s first encounter with BSD in any form</li>
<li>If you were a m0n0wall user, fear not, you&#39;ve got <em>plenty</em> of choices for a potential replacement: doing it yourself with something like <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a>, or going the premade route with something like <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a>, <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> or the <a href="http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router" rel="nofollow">BSD Router Project</a></li>
<li>The founder&#39;s announcement includes these closing words: &quot;m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can.&quot;</li>
<li>While m0n0wall didn&#39;t get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***</li>
</ul>

<h2>Interview - Alex Reece &amp; Matt Ahrens - <a href="mailto:alex@delphix.com" rel="nofollow">alex@delphix.com</a> &amp; <a href="mailto:matt@delphix.com" rel="nofollow">matt@delphix.com</a> / <a href="https://twitter.com/openzfs" rel="nofollow">@openzfs</a></h2>

<p>What&#39;s new in OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/patching-obsd" rel="nofollow">Making your first patch (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans" rel="nofollow">Overlaying remote LANs with OpenBSD&#39;s VXLAN</a></h3>

<ul>
<li>Have you ever wanted to &quot;merge&quot; multiple remote LANs? OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4" rel="nofollow">vxlan(4)</a> is exactly what you need</li>
<li>This article talks about using it to connect two virtualized infrastructures on different ESXi servers</li>
<li>It gives a bit of networking background first, in case you&#39;re not quite up to speed on all this stuff</li>
<li>This tool opens up a lot of very cool possibilities, even possibly doing a &quot;remote&quot; LAN party</li>
<li>Be sure to check the <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">AsiaBSDCon talk</a> about VXLANs if you haven&#39;t already
***</li>
</ul>

<h3><a href="http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html" rel="nofollow">2020, year of the PCBSD desktop</a></h3>

<ul>
<li>Here we have a blog post about BSD on the desktop, straight from a KDE developer</li>
<li>He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux&#39;s desktop market share (small as it may be)</li>
<li>With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option</li>
<li>ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one</li>
<li>There was also some <a href="http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth" rel="nofollow">discussion on Slashdot</a> that might be worth reading
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html" rel="nofollow">OpenSSH host key rotation, redux</a></h3>

<ul>
<li>We mentioned the new OpenSSH host key rotation and other goodies in <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">a previous episode</a>, but things have changed a little bit since then</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">djm</a> says &quot;almost immediately after smugly declaring &#39;mission accomplished&#39;, the bug reports started rolling in.&quot;</li>
<li>There were some initial complaints from developers about the new options, and a serious bug shortly thereafter</li>
<li>After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests</li>
<li>Most importantly, the bigger big fix was described as: &quot;a malicious server (say, &quot;host-a&quot;) could advertise the public key of another server (say, &quot;host-b&quot;). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide.&quot;</li>
<li>None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e" rel="nofollow">PCBSD tries out LibreSSL</a></h3>

<ul>
<li>PCBSD users may soon be seeing a lot less security problems because of two recent changes</li>
<li>After switching over to OpenNTPD <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">last week</a>, PCBSD decides to give the <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">portable LibreSSL</a> a try too</li>
<li>Note that this is only for the packages built from ports, not the base system unfortunately</li>
<li>They&#39;re not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD&#39;s ports are built against it</li>
<li>A good <a href="https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb" rel="nofollow">number of patches</a> are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla</li>
<li>Look forward to Kris wearing a &quot;<a href="https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&state=item&dept_id=01&sub_dept_id=01&product_id=TSHIRTOSSL" rel="nofollow">keep calm and abandon OpenSSL</a>&quot; shirt in the near future
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28nyJ5omV" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s2wYUmUmh0" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s2BAKAQvMt" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html" rel="nofollow">Debian</a> <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html" rel="nofollow">Dejavu</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html" rel="nofollow">Package gone missing</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
