<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 16 Apr 2026 14:38:37 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Openiked”</title>
    <link>https://www.bsdnow.tv/tags/openiked</link>
    <pubDate>Thu, 12 Jan 2023 03:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>489: Refreshing Perspective</title>
  <link>https://www.bsdnow.tv/489</link>
  <guid isPermaLink="false">f53ef4ed-7907-4da2-8402-7154f773f79e</guid>
  <pubDate>Thu, 12 Jan 2023 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f53ef4ed-7907-4da2-8402-7154f773f79e.mp3" length="34737024" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD vs. Linux – Networking, HDMI sound output through TV speakers on FreeBSD 13, Getting started with tmux, Samba Active Directory, OpenIKED 7.2 released, FreeBSD Plasma 5 GUI Install, DHCP server howto in German, and more</itunes:subtitle>
  <itunes:duration>36:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD vs. Linux – Networking, HDMI sound output through TV speakers on FreeBSD 13, Getting started with tmux, Samba Active Directory, OpenIKED 7.2 released, FreeBSD Plasma 5 GUI Install, DHCP server howto in German, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
FreeBSD vs. Linux – Networking (https://klarasystems.com/articles/freebsd-vs-linux-networking/)
(Solved), HDMI sound output through TV speakers Freebsd 13 or @4 plus VCHIQ audio patch - Raspberry Pi Forums (https://forums.raspberrypi.com/viewtopic.php?t=343233)
News Roundup
Getting started with tmux (https://ittavern.com/getting-started-with-tmux/)
Samba Active Directory (https://cromwell-intl.com/open-source/samba-active-directory/freebsd-raspberry-pi.html)
OpenIKED 7.2 released (http://undeadly.org/cgi?action=article;sid=20221202230711)
FreeBSD Plasma 5 GUI Install (https://byte--sized-de.translate.goog/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/?_x_tr_sl=auto&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en-US&amp;amp;_x_tr_pto=wapp)
Original German Article (https://byte-sized.de/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/)
***
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, networking, hdmi sound output, tv speakers, tmux, samba, active directory, openiked, plasma 5 GUI, dhcp server</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD vs. Linux – Networking, HDMI sound output through TV speakers on FreeBSD 13, Getting started with tmux, Samba Active Directory, OpenIKED 7.2 released, FreeBSD Plasma 5 GUI Install, DHCP server howto in German, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-vs-linux-networking/" rel="nofollow">FreeBSD vs. Linux – Networking</a></h3>

<hr>

<h3><a href="https://forums.raspberrypi.com/viewtopic.php?t=343233" rel="nofollow">(Solved), HDMI sound output through TV speakers Freebsd 13 or @4 plus VCHIQ audio patch - Raspberry Pi Forums</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ittavern.com/getting-started-with-tmux/" rel="nofollow">Getting started with tmux</a></h3>

<hr>

<h3><a href="https://cromwell-intl.com/open-source/samba-active-directory/freebsd-raspberry-pi.html" rel="nofollow">Samba Active Directory</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20221202230711" rel="nofollow">OpenIKED 7.2 released</a></h3>

<hr>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp" rel="nofollow">FreeBSD Plasma 5 GUI Install</a></h3>

<ul>
<li><a href="https://byte-sized.de/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/" rel="nofollow">Original German Article</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD vs. Linux – Networking, HDMI sound output through TV speakers on FreeBSD 13, Getting started with tmux, Samba Active Directory, OpenIKED 7.2 released, FreeBSD Plasma 5 GUI Install, DHCP server howto in German, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-vs-linux-networking/" rel="nofollow">FreeBSD vs. Linux – Networking</a></h3>

<hr>

<h3><a href="https://forums.raspberrypi.com/viewtopic.php?t=343233" rel="nofollow">(Solved), HDMI sound output through TV speakers Freebsd 13 or @4 plus VCHIQ audio patch - Raspberry Pi Forums</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://ittavern.com/getting-started-with-tmux/" rel="nofollow">Getting started with tmux</a></h3>

<hr>

<h3><a href="https://cromwell-intl.com/open-source/samba-active-directory/freebsd-raspberry-pi.html" rel="nofollow">Samba Active Directory</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20221202230711" rel="nofollow">OpenIKED 7.2 released</a></h3>

<hr>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp" rel="nofollow">FreeBSD Plasma 5 GUI Install</a></h3>

<ul>
<li><a href="https://byte-sized.de/linux-unix/freebsd-kde-plasma-5-als-gui-installieren/" rel="nofollow">Original German Article</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>471: De-Penguinization</title>
  <link>https://www.bsdnow.tv/471</link>
  <guid isPermaLink="false">6550223a-8916-4ffc-ab29-30b5caa18d2c</guid>
  <pubDate>Thu, 08 Sep 2022 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6550223a-8916-4ffc-ab29-30b5caa18d2c.mp3" length="70774272" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Ten Things To Do After Installing FreeBSD, BSD for Linux users, r2k22 Hackathon Report on rpki-client, Configuring OpenIKED, De-Penguin Me, and more </itunes:subtitle>
  <itunes:duration>49:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Ten Things To Do After Installing FreeBSD, BSD for Linux users, r2k22 Hackathon Report on rpki-client, Configuring OpenIKED, De-Penguin Me, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Ten Things To Do After Installing FreeBSD (https://bastillebsd.org/blog/2022/07/14/ten-things-to-do-after-installing-freebsd/)
News Roundup
hpr3655 :: BSD for Linux users (http://hackerpublicradio.org/eps.php?id=3655)
r2k22 Hackathon Report: Job Snijders (job@) on rpki-client and more (http://undeadly.org/cgi?action=article;sid=20220701171631)
Configuring OpenIKED (https://wiki.ircnow.org/index.php?n=Iked.Configure)
De-Penguin Me (https://depenguin.me/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, interview, ports, packages, jails, ten things, to do, users, rk2k22, hackathon, rpki-client, openiked, configuring, configuration, de-penguin</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Ten Things To Do After Installing FreeBSD, BSD for Linux users, r2k22 Hackathon Report on rpki-client, Configuring OpenIKED, De-Penguin Me, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://bastillebsd.org/blog/2022/07/14/ten-things-to-do-after-installing-freebsd/" rel="nofollow">Ten Things To Do After Installing FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hackerpublicradio.org/eps.php?id=3655" rel="nofollow">hpr3655 :: BSD for Linux users</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220701171631" rel="nofollow">r2k22 Hackathon Report: Job Snijders (job@) on rpki-client and more</a></h3>

<hr>

<h3><a href="https://wiki.ircnow.org/index.php?n=Iked.Configure" rel="nofollow">Configuring OpenIKED</a></h3>

<hr>

<h3><a href="https://depenguin.me/" rel="nofollow">De-Penguin Me</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Ten Things To Do After Installing FreeBSD, BSD for Linux users, r2k22 Hackathon Report on rpki-client, Configuring OpenIKED, De-Penguin Me, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://bastillebsd.org/blog/2022/07/14/ten-things-to-do-after-installing-freebsd/" rel="nofollow">Ten Things To Do After Installing FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hackerpublicradio.org/eps.php?id=3655" rel="nofollow">hpr3655 :: BSD for Linux users</a></h3>

<hr>

<h3><a href="http://undeadly.org/cgi?action=article;sid=20220701171631" rel="nofollow">r2k22 Hackathon Report: Job Snijders (job@) on rpki-client and more</a></h3>

<hr>

<h3><a href="https://wiki.ircnow.org/index.php?n=Iked.Configure" rel="nofollow">Configuring OpenIKED</a></h3>

<hr>

<h3><a href="https://depenguin.me/" rel="nofollow">De-Penguin Me</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 250: BSDCan 2018 Recap | BSD Now 250</title>
  <link>https://www.bsdnow.tv/250</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2107</guid>
  <pubDate>Thu, 14 Jun 2018 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4a856940-c133-4d38-98e6-88d80a82c29a.mp3" length="60891452" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>TrueOS becoming a downstream fork with Trident, our BSDCan 2018 recap, HardenedBSD Foundation founding efforts, VPN with OpenIKED on OpenBSD, FreeBSD on a System76 Galago Pro, and hardware accelerated crypto on Octeons.</itunes:subtitle>
  <itunes:duration>1:41:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>TrueOS becoming a downstream fork with Trident, our BSDCan 2018 recap, HardenedBSD Foundation founding efforts, VPN with OpenIKED on OpenBSD, FreeBSD on a System76 Galago Pro, and hardware accelerated crypto on Octeons.
&lt;p&gt;##Headlines##&lt;br&gt;
&lt;a href="https://www.trueos.org/blog/trueosdownstream/"&gt;TrueOS to Focus on Core Operating System&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The TrueOS Project has some big plans in the works, and we want to take a minute and share them with you. Many have come to know TrueOS as the “graphical FreeBSD” that makes things easy for newcomers to the BSDs. Today we’re announcing that TrueOS is shifting our focus a bit to become a cutting-edge operating system that keeps all of the stability that you know and love from ZFS (OpenZFS) and FreeBSD, and adds additional features to create a fresh, innovative operating system. Our goal is to create a core-centric operating system that is modular, functional, and perfect for do-it-yourselfers and advanced users alike.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;TrueOS will become a downstream fork that will build on FreeBSD by integrating new software technologies like OpenRC and LibreSSL. Work has already begun which allows TrueOS to be used as a base platform for other projects, including JSON-based manifests, integrated Poudriere / pkg tools and much more. We’re planning on a six month release cycle to keep development moving and fresh, allowing us to bring you hot new features to ZFS, bhyve and related tools in a timely manner. This makes TrueOS the perfect fit to serve as the basis for building other distributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Some of you are probably asking yourselves “But what if I want to have a graphical desktop?” Don’t worry! We’re making sure that everyone who knows and loves the legacy desktop version of TrueOS will be able to continue using a FreeBSD-based, graphical operating system in the future. For instance, if you want to add KDE, just use sudo pkg install kde and voila! You have your new shiny desktop. Easy right? This allows us to get back to our roots of being a desktop agnostic operating system. If you want to add a new desktop environment, you get to pick the one that best suits your use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;We know that some of you will still be looking for an out-of-the-box solution similar to legacy PC-BSD and TrueOS. We’re happy to announce that Project Trident will take over graphical FreeBSD development going forward. Not much is going to change in that regard other than a new name! You’ll still have Lumina Desktop as a lightweight and feature-rich desktop environment and tons of utilities from the legacy TrueOS toolchain like sysadm and AppCafe. There will be migration paths available for those that would like to move to other FreeBSD-based distributions like Project Trident or GhostBSD.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;We look forward to this new chapter for TrueOS and hope you will give the new edition a spin! Tell us what you think about the new changes by leaving us a comment. Don’t forget you can ask us questions on our Twitter and be a part of our community by joining the new TrueOS Forums when they go live in about a week. Thanks for being a loyal fan of TrueOS.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;###&lt;a href="http://project-trident.org/faq"&gt;Project Trident FAQ&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Q: Why did you pick the name “Project Trident”?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: We were looking for a name that was unique, yet would still relate to the BSD community. Since Beastie (the FreeBSD mascot) is always pictured with a trident, it felt like that would be a great name.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: Where can users go for technical support?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: At the moment, Project Trident will continue sharing the TrueOS community forums and Telegram channels. We are currently evaluating dedicated options for support channels in the future.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: Can I help contribute to the project?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: We are always looking for developers who want to join the project. If you’re not a developer you can still help, as a community project we will be more reliant on contributions from the community in the form of how-to guides and other user-centric documentation and support systems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: How is the project supported financially?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: Project Trident is sponsored by the community, from both individuals and corporations. iXsystems has stepped up as the first enterprise-level sponsor of the project, and has been instrumental in getting Project Trident up and running. Please visit the Sponsors page to see all the current sponsors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: How can I help support the project financially?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: Several methods exist, from one time or recurring donations via Paypal to limited time swag t-shirt campaigns during the year. We are also looking into more alternative methods of support, so please visit the Sponsors page to see all the current methods of sponsorship.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: Will there be any transparency of the financial donations and expenditures?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: Yes, we will be totally open with how much money comes into the project and what it is spent on. Due to concerns of privacy, we will not identify individuals and their donation amounts unless they specifically request to be identified. We will release a monthly overview in/out ledger, so that community members can see where their money is going.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Relationship with TrueOS&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Project Trident does have very close ties to the TrueOS project, since most of the original Project Trident developers were once part of the TrueOS project before it became a distribution platform. For users of the TrueOS desktop, we have some additional questions and answers below.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Q: Do we need to be at a certain TrueOS install level/release to upgrade?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: As long as you have a TrueOS system which has been updated to at least the 18.03 release you should be able to just perform a system update to be automatically upgraded to Project Trident.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Q: Which members moved from TrueOS to Project Trident?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;A: Project Trident is being led by prior members of the TrueOS desktop team. Ken and JT (development), Tim (documentation) and Rod (Community/Support). Since Project Trident is a community-first project, we look forward to working with new members of the team.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;###&lt;a href="https://www.bsdcan.org/2018"&gt;BSDCan&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;BSDCan finished Saturday last week&lt;/li&gt;
&lt;li&gt;It started with the GoatBoF on Tuesday at the Royal Oak Pub, where people had a chance to meet and greet. Benedict could not attend due to an all-day FreeBSD Foundation meeting and and even FreeBSD Journal Editorial Board meeting.&lt;/li&gt;
&lt;li&gt;The FreeBSD devsummit was held the next two days in parallel to the tutorials. Gordon Tetlow, who organized the devsummit, opened the devsummit. Deb Goodkin from the FreeBSD Foundation gave the first talk with a Foundation update, highlighting current and future efforts. Li-Wen Hsu is now employed by the Foundation to assist in QA work (Jenkins, CI/CD) and Gordon Tetlow has a part-time contract to help secteam as their secretary.&lt;/li&gt;
&lt;li&gt;Next, the FreeBSD core team (among them Allan and Benedict) gave a talk about what has happened this last term. With a core election currently running, some of these items will carry over to the next core team, but there were also some finished ones like the FCP process and FreeBSD members initiative. People in the audience asked questions on various topics of interest.&lt;/li&gt;
&lt;li&gt;After the coffee break, the release engineering team gave a talk about their efforts in terms of making releases happen in time and good quality.&lt;/li&gt;
&lt;li&gt;Benedict had to give his Ansible tutorial in the afternoon, which had roughly 15 people attending. Most of them beginners, we could get some good discussions going and I also learned a few new tricks. The overall feedback was positive and one even asked what I’m going to teach next year.&lt;/li&gt;
&lt;li&gt;The second day of the FreeBSD devsummit began with Gordon Tetlow giving an insight into the FreeBSD Security team (aka secteam). He gave a overview of secteam members and responsibilities, explaining the process based on a long past advisory. Developers were encouraged to help out secteam. NDAs and proper disclosure of vulnerabilities were also discussed, and the audience had some feedback and questions.&lt;/li&gt;
&lt;li&gt;When the coffee break was over, the FreeBSD 12.0 planning session happened. A &lt;a href="https://wiki.freebsd.org/DevSummit/201806/HaveNeedWant12"&gt;Google doc&lt;/a&gt; served as a collaborative way of gathering features and things left to do. People signed up for it or were volunteered. Some features won’t make it into 12.0 as they are not 100% ready for prime time and need a few more rounds of testing and bugfixing. Still, 12.0 will have some compelling features.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://theta360.com/s/xuR4ogsjGmu584JJju0vUaTA"&gt;A 360° group picture&lt;/a&gt; was taken after lunch, and then people split up into the working groups for the afternoon or started hacking in the UofO Henderson residence.&lt;/li&gt;
&lt;li&gt;Benedict and Allan both attended the OpenZFS working group, lead by Matt Ahrens. He presented the completed and outstanding work in FreeBSD, without spoiling too much of the ZFS presentations of various people that happened later at the conference.&lt;/li&gt;
&lt;li&gt;Benedict joined the boot code session a bit late (hallway track is the reason) when most things seem to have already been discussed.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.talegraph.com/tales/WmObSRejzT"&gt;BSDCan 2018 — Ottawa (In Pictures)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://photos.google.com/share/AF1QipPv_eOz9z-e8R23DkSEcMLF9ivl8est0H4k0lkAoIdY0Jgsn4eyKT54fPyy4EukCw?key=RmJoNS1uOHU2djRDdzZxNGM4ZEY1dFVKamhCNThR"&gt;iXsystems Photos from BSDCan 2018&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;br&gt;
&lt;a href="https://hardenedbsd.org/article/shawn-webb/2018-06-09/june-hardenedbsd-foundation-update"&gt;June HardenedBSD Foundation Update&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We at HardenedBSD are working towards starting up a 501©(3) not-for-profit organization in the USA. Setting up this organization will allow future donations to be tax deductible. We’ve made progress and would like to share with you the current state of affairs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;We have identified, sent invitations out, and received acceptance letters from six people who will serve on the HardenedBSD Foundation Board of Directors. You can find their bios below. In the latter half of June 2018 or the beginning half of July 2018, we will meet for the first time as a board and formally begin the process of creating the documentation needed to submit to the local, state, and federal tax services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Here’s a brief introduction to those who will serve on the board:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;W. Dean Freeman (Advisor): Dean has ten years of professional experience with deploying and security Unix and networking systems, including assessing systems security for government certification and assessing the efficacy of security products. He was introduced to Unix via FreeBSD 2.2.8 on an ISP shell account as a teenager. Formerly, he was the Snort port maintainer for FreeBSD while working in the Sourcefire VRT, and has contributed entropy-related patches to the FreeBSD and HardenedBSD projects – a topic on which he presented at vBSDCon 2017.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ben La Monica (Advisor): Ben is a Senior Technology Manager of Software Engineering at Morningstar, Inc and has been developing software for over 15 years in a variety of languages. He advocates open source software and enjoys tinkering with electronics and home automation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;George Saylor (Advisor): George is a Technical Directory at G2, Inc. Mr. Saylor has over 28 years of information systems and security experience in a broad range of disciplines. His core focus areas are automation and standards in the event correlation space as well as penetration and exploitation of computer systems. Mr Saylor was also a co-founder of the OpenSCAP project.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Virginia Suydan (Accountant and general administrator): Accountant and general administrator for the HardenedBSD Foundation. She has worked with Shawn Webb for tax and accounting purposes for over six years.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Shawn Webb (Director): Co-founder of HardenedBSD and all-around infosec wonk. He has worked and played in the infosec industry, doing both offensive and defensive research, for around fifteen years. He loves open source technologies and likes to frustrate the bad guys.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ben Welch (Advisor): Ben is currently a Security Engineer at G2, Inc. He graduated from Pennsylvania College of Technology with a Bachelors in Information Assurance and Security. Ben likes long walks, beaches, candlelight dinners, and attending various conferences like BSides and ShmooCon.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://medium.com/@cmacrae/your-own-vpn-with-openiked-openbsd-13d7abd3d1d4"&gt;Your own VPN with OpenIKED &amp;amp; OpenBSD&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Remote connectivity to your home network is something I think a lot of people find desirable. Over the years, I’ve just established an SSH tunnel and use it as a SOCKS proxy, sending my traffic through that. It’s a nice solution for a “poor man’s VPN”, but it can be a bit clunky, and it’s not great having to expose SSH to the world, even if you make sure to lock everything down &lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;I set out the other day to finally do it properly. I’d come across this great post by Gordon Turner: &lt;a href="https://blog.gordonturner.com/2018/02/25/openbsd-6-2-vpn-endpoint-for-ios-and-macos/"&gt;OpenBSD 6.2 VPN Endpoint for iOS and macOS&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Whilst it was exactly what I was looking for, it outlined how to set up an L2TP VPN. Really, I wanted IKEv2 for performance and security reasons (I won’t elaborate on this here, if you’re curious about the differences, there’s a lot of content out on the web explaining this).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;The client systems I’d be using have native support for IKEv2 (iOS, macOS, other BSD systems). But, I couldn’t find any tutorials in the same vein.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;So, let’s get stuck in!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;A quick note ✍️&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;This guide will walk through the set up of an IKEv2 VPN using OpenIKED on OpenBSD. It will detail a “road warrior” configuration, and use a PSK (pre-shared-key) for authentication. I’m sure it can be easily adapted to work on any other platforms that OpenIKED is available on, but keep in mind my steps are specifically for OpenBSD.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Server Configuration&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;As with all my home infrastructure, I crafted this set-up declaratively. So, I had the deployment of the VM setup in Terraform (deployed on my private Triton cluster), and wrote the configuration in Ansible, then tied them together using radekg/terraform-provisioner-ansible.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;One of the reasons I love Ansible is that its syntax is very simplistic, yet expressive. As such, I feel it fits very well into explaining these steps with snippets of the playbook I wrote.  I’ll link the full playbook a bit further down for those interested.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;See the full article for the information on:&lt;/li&gt;
&lt;li&gt;sysctl parameters&lt;/li&gt;
&lt;li&gt;The naughty list (optional)&lt;/li&gt;
&lt;li&gt;Configure the VPN network interface&lt;/li&gt;
&lt;li&gt;Configure the firewall&lt;/li&gt;
&lt;li&gt;Configure the iked service&lt;/li&gt;
&lt;li&gt;Gateway configuration&lt;/li&gt;
&lt;li&gt;Client configuration&lt;/li&gt;
&lt;li&gt;Troubleshooting&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;DigitalOcean&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;###&lt;a href="https://corrupted.io/2018/05/15/system76-free-bsd.html"&gt;FreeBSD on a System76 Galago Pro&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Hey all, It’s been a while since I last posted but I thought I would hammer something out here. My most recent purchase was a System76 Galago Pro. I thought, afer playing with POP! OS a bit, is there any reason I couldn’t get BSD on this thing. Turns out the answer is no, no there isnt and it works pretty decently.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;To get some accounting stuff out of the way I tested this all on FreeBSD Head and 11.1, and all of it is valid as of May 10, 2018. Head is a fast moving target so some of this is only bound to improve.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The hardware&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Intel Core i5 Gen 8&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;UHD Graphics 620&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;16 GB DDR4 Ram&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;RTL8411B PCI Express Card Reader&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;RTL8111 Gigabit ethernet controller&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Intel HD Audio&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Samsung SSD 960 PRO 512GB NVMe&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The caveats&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;There are a few things that I cant seem to make work straight out of the box, and that is the SD Card reader, the backlight, and the audio is a bit finicky. Also the trackpad doesn’t respond to two finger scrolling. The wiki is mostly up to date, there are a few edits that need to be made still but there is a bug where I cant register an account yet so I haven’t made all the changes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Processor&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;It works like any other Intel processor. Pstates and throttling work.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Graphics&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The boot menu sets itself to what looks like 1024x768, but works as you expect in a tiny window. The text console does the full 3200x1800 resolution, but the text is ultra tiny. There isnt a font for the console that covers hidpi screens yet. As for X Windows it requres the drm-kmod-next package. Once installed follow the directions from the package and it works with almost no fuss. I have it running on X with full intel acceleration, but it is running at it’s full 3200x1800 resolution, to scale that down just do xrandr --output eDP-1 --scale 0.5x0.5 it will blow it up to roughly 200%. Due to limitations with X windows and hidpi it is harder to get more granular.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Intel Wireless 8265&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The wireless uses the iwm module, as of right now it does not seem to automagically load right now. Adding iwm_load=“YES” will cause the module to load on boot and kldload iwm&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Battery&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I seem to be getting about 5 hours out of the battery, but everything reports out of the box as expected. I could get more by throttling the CPU down speed wise.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Overall impression&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;It is a pretty decent experience. While not as polished as a Thinkpad there is a lot of potential with a bit of work and polishing. The laptop itself is not bad, the keyboard is responsive. The build quality is pretty solid. My only real complaint is the trackpad is stiff to click and sort of tiny. They seem to be a bit indifferent to non linux OSes running on the gear but that isnt anything new. I wont have any problems using it and is enough that when I work through this laptop, but I’m not sure at this stage if my next machine will be a System76 laptop, but they have impressed me enough to put them in the running when I go to look for my next portable machine but it hasn’t yet replaced the hole left in my heart by lenovo messing with the thinkpad.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://undeadly.org/cgi?action=article;sid=20180418073437"&gt;Hardware accelerated AES/HMAC-SHA on octeons&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;In this commit, visa@ submitted code (disabled for now) to use built-in acceleration on octeon CPUs, much like AESNI for x86s.
I decided to test tcpbench(1) and IPsec, before and after updating and enabling the octcrypto(4) driver.
I didn't capture detailed perf stats from before the update, I had heard someone say that Edgerouter Lite boxes would only do some 6MBit/s over ipsec, so I set up a really simple ipsec.conf with ike esp from A to B leading to a policy of
esp tunnel from A to B spi 0xdeadbeef auth hmac-sha2-256 enc aes
going from one ERL to another (I collect octeons, so I have a bunch to test with) and let tcpbench run for a while on it. My numbers hovered around 7Mbit/s, which coincided with what I've heard, and also that most of the CPU gets used while doing it.
Then I edited /sys/arch/octeon/conf/GENERIC, removed the # from octcrypto0 at mainbus0 and recompiled. Booted into the new kernel and got a octcrypto0 line in dmesg, and it was time to rock the ipsec tunnel again. The crypto algorithm and HMAC used by default on ipsec coincides nicely with the list of accelerated functions provided by the driver.
Before we get to tunnel traffic numbers, just one quick look at what systat pigs says while the ipsec is running at full steam:
 PID USER        NAME                 CPU     20\    40\    60\    80\  100\
   58917 root        crypto             52.25 #################
   42636 root        softnet            42.48 ##############
                     (idle)             29.74 #########
    1059 root        tcpbench           24.22 #######
   67777 root        crynlk             19.58 ######
So this indicates that the load from doing ipsec and generating the traffic is somewhat nicely evened out over the two cores in the Edgerouter, and there's even some CPU left unused, which means I can actually ssh into it and have it usable. I have had it running for almost 2 days now, moving some 2.1TB over the tunnel.
Now for the new and improved performance numbers:
   204452123        4740752       37.402  100.00% 
Conn:   1 Mbps:       37.402 Peak Mbps:       58.870 Avg Mbps:       37.402
   204453149        4692968       36.628  100.00% 
Conn:   1 Mbps:       36.628 Peak Mbps:       58.870 Avg Mbps:       36.628
   204454167        5405552       42.480  100.00% 
Conn:   1 Mbps:       42.480 Peak Mbps:       58.870 Avg Mbps:       42.480
   204455188        5202496       40.804  100.00% 
Conn:   1 Mbps:       40.804 Peak Mbps:       58.870 Avg Mbps:       40.804
   204456194        5062208       40.256  100.00% 
Conn:   1 Mbps:       40.256 Peak Mbps:       58.870 Avg Mbps:       40.256
The tcpbench numbers fluctuate up and down a bit, but the output is nice enough to actually keep tabs on the peak values. Peaking to 58.8MBit/s! Of course, as you can see, the average is lower but nice anyhow.
A manyfold increase in performance, which is good enough in itself, but also moves the throughput from a speed that would make a poor but cheap gateway to something actually useful and decent for many home network speeds. Biggest problem after this gets enabled will be that my options to buy cheap used ERLs diminish.
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.etinc.com/122/Using-FreeBSD-Text-Dumps"&gt;Using FreeBSD Text Dumps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=334391"&gt;llvm’s lld now the default linker for amd64 on FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blather.michaelwlucas.com/archives/3194"&gt;Author Discoverability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/papers/BeckPledgeUnveilBSDCan2018.pdf"&gt;Pledge and Unveil in OpenBSD {pdf}&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://2018.eurobsdcon.org/call-for-papers/"&gt;EuroBSDCon 2018 CFP Closes June 17, hurry up and get your submissions in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://2018.eurobsdcon.org/paul-schenkeveld-travel-grant/"&gt;Just want to attend, but need help getting to the conference? Applications for the Paul Schenkeveld travel grant accepted until June 15th&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Casey - &lt;a href="http://dpaste.com/2H42V7W#wrap"&gt;ZFS on Digital Ocean&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jürgen - &lt;a href="http://dpaste.com/3N7ZN8C#wrap"&gt;A Question&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kevin - &lt;a href="http://dpaste.com/231CY5Z#wrap"&gt;Failover best practice&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dennis - &lt;a href="http://dpaste.com/1QPNB25#wrap"&gt;SQL&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, tutorial, howto, guide, bsd, interview, OpenIKED, HardenedBSD, Trident, Project Trident, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>TrueOS becoming a downstream fork with Trident, our BSDCan 2018 recap, HardenedBSD Foundation founding efforts, VPN with OpenIKED on OpenBSD, FreeBSD on a System76 Galago Pro, and hardware accelerated crypto on Octeons.</p>

<p>##Headlines##<br>
###<a href="https://www.trueos.org/blog/trueosdownstream/">TrueOS to Focus on Core Operating System</a></p>

<blockquote>
<p>The TrueOS Project has some big plans in the works, and we want to take a minute and share them with you. Many have come to know TrueOS as the “graphical FreeBSD” that makes things easy for newcomers to the BSDs. Today we’re announcing that TrueOS is shifting our focus a bit to become a cutting-edge operating system that keeps all of the stability that you know and love from ZFS (OpenZFS) and FreeBSD, and adds additional features to create a fresh, innovative operating system. Our goal is to create a core-centric operating system that is modular, functional, and perfect for do-it-yourselfers and advanced users alike.</p>
</blockquote>

<blockquote>
<p>TrueOS will become a downstream fork that will build on FreeBSD by integrating new software technologies like OpenRC and LibreSSL. Work has already begun which allows TrueOS to be used as a base platform for other projects, including JSON-based manifests, integrated Poudriere / pkg tools and much more. We’re planning on a six month release cycle to keep development moving and fresh, allowing us to bring you hot new features to ZFS, bhyve and related tools in a timely manner. This makes TrueOS the perfect fit to serve as the basis for building other distributions.</p>
</blockquote>

<blockquote>
<p>Some of you are probably asking yourselves “But what if I want to have a graphical desktop?” Don’t worry! We’re making sure that everyone who knows and loves the legacy desktop version of TrueOS will be able to continue using a FreeBSD-based, graphical operating system in the future. For instance, if you want to add KDE, just use sudo pkg install kde and voila! You have your new shiny desktop. Easy right? This allows us to get back to our roots of being a desktop agnostic operating system. If you want to add a new desktop environment, you get to pick the one that best suits your use.</p>
</blockquote>

<blockquote>
<p>We know that some of you will still be looking for an out-of-the-box solution similar to legacy PC-BSD and TrueOS. We’re happy to announce that Project Trident will take over graphical FreeBSD development going forward. Not much is going to change in that regard other than a new name! You’ll still have Lumina Desktop as a lightweight and feature-rich desktop environment and tons of utilities from the legacy TrueOS toolchain like sysadm and AppCafe. There will be migration paths available for those that would like to move to other FreeBSD-based distributions like Project Trident or GhostBSD.</p>
</blockquote>

<blockquote>
<p>We look forward to this new chapter for TrueOS and hope you will give the new edition a spin! Tell us what you think about the new changes by leaving us a comment. Don’t forget you can ask us questions on our Twitter and be a part of our community by joining the new TrueOS Forums when they go live in about a week. Thanks for being a loyal fan of TrueOS.</p>
</blockquote>

<p>###<a href="http://project-trident.org/faq">Project Trident FAQ</a></p>

<ul>
<li>Q: Why did you pick the name “Project Trident”?</li>
</ul>

<blockquote>
<p>A: We were looking for a name that was unique, yet would still relate to the BSD community. Since Beastie (the FreeBSD mascot) is always pictured with a trident, it felt like that would be a great name.</p>
</blockquote>

<ul>
<li>Q: Where can users go for technical support?</li>
</ul>

<blockquote>
<p>A: At the moment, Project Trident will continue sharing the TrueOS community forums and Telegram channels. We are currently evaluating dedicated options for support channels in the future.</p>
</blockquote>

<ul>
<li>Q: Can I help contribute to the project?</li>
</ul>

<blockquote>
<p>A: We are always looking for developers who want to join the project. If you’re not a developer you can still help, as a community project we will be more reliant on contributions from the community in the form of how-to guides and other user-centric documentation and support systems.</p>
</blockquote>

<ul>
<li>Q: How is the project supported financially?</li>
</ul>

<blockquote>
<p>A: Project Trident is sponsored by the community, from both individuals and corporations. iXsystems has stepped up as the first enterprise-level sponsor of the project, and has been instrumental in getting Project Trident up and running. Please visit the Sponsors page to see all the current sponsors.</p>
</blockquote>

<ul>
<li>Q: How can I help support the project financially?</li>
</ul>

<blockquote>
<p>A: Several methods exist, from one time or recurring donations via Paypal to limited time swag t-shirt campaigns during the year. We are also looking into more alternative methods of support, so please visit the Sponsors page to see all the current methods of sponsorship.</p>
</blockquote>

<ul>
<li>Q: Will there be any transparency of the financial donations and expenditures?</li>
</ul>

<blockquote>
<p>A: Yes, we will be totally open with how much money comes into the project and what it is spent on. Due to concerns of privacy, we will not identify individuals and their donation amounts unless they specifically request to be identified. We will release a monthly overview in/out ledger, so that community members can see where their money is going.</p>
</blockquote>

<ul>
<li>
<p>Relationship with TrueOS</p>
</li>
<li>
<p>Project Trident does have very close ties to the TrueOS project, since most of the original Project Trident developers were once part of the TrueOS project before it became a distribution platform. For users of the TrueOS desktop, we have some additional questions and answers below.</p>
</li>
<li>
<p>Q: Do we need to be at a certain TrueOS install level/release to upgrade?</p>
</li>
</ul>

<blockquote>
<p>A: As long as you have a TrueOS system which has been updated to at least the 18.03 release you should be able to just perform a system update to be automatically upgraded to Project Trident.</p>
</blockquote>

<ul>
<li>Q: Which members moved from TrueOS to Project Trident?</li>
</ul>

<blockquote>
<p>A: Project Trident is being led by prior members of the TrueOS desktop team. Ken and JT (development), Tim (documentation) and Rod (Community/Support). Since Project Trident is a community-first project, we look forward to working with new members of the team.</p>
</blockquote>

<p><hr></p>

<p><strong>iXsystems</strong></p>

<p>###<a href="https://www.bsdcan.org/2018">BSDCan</a></p>

<ul>
<li>BSDCan finished Saturday last week</li>
<li>It started with the GoatBoF on Tuesday at the Royal Oak Pub, where people had a chance to meet and greet. Benedict could not attend due to an all-day FreeBSD Foundation meeting and and even FreeBSD Journal Editorial Board meeting.</li>
<li>The FreeBSD devsummit was held the next two days in parallel to the tutorials. Gordon Tetlow, who organized the devsummit, opened the devsummit. Deb Goodkin from the FreeBSD Foundation gave the first talk with a Foundation update, highlighting current and future efforts. Li-Wen Hsu is now employed by the Foundation to assist in QA work (Jenkins, CI/CD) and Gordon Tetlow has a part-time contract to help secteam as their secretary.</li>
<li>Next, the FreeBSD core team (among them Allan and Benedict) gave a talk about what has happened this last term. With a core election currently running, some of these items will carry over to the next core team, but there were also some finished ones like the FCP process and FreeBSD members initiative. People in the audience asked questions on various topics of interest.</li>
<li>After the coffee break, the release engineering team gave a talk about their efforts in terms of making releases happen in time and good quality.</li>
<li>Benedict had to give his Ansible tutorial in the afternoon, which had roughly 15 people attending. Most of them beginners, we could get some good discussions going and I also learned a few new tricks. The overall feedback was positive and one even asked what I’m going to teach next year.</li>
<li>The second day of the FreeBSD devsummit began with Gordon Tetlow giving an insight into the FreeBSD Security team (aka secteam). He gave a overview of secteam members and responsibilities, explaining the process based on a long past advisory. Developers were encouraged to help out secteam. NDAs and proper disclosure of vulnerabilities were also discussed, and the audience had some feedback and questions.</li>
<li>When the coffee break was over, the FreeBSD 12.0 planning session happened. A <a href="https://wiki.freebsd.org/DevSummit/201806/HaveNeedWant12">Google doc</a> served as a collaborative way of gathering features and things left to do. People signed up for it or were volunteered. Some features won’t make it into 12.0 as they are not 100% ready for prime time and need a few more rounds of testing and bugfixing. Still, 12.0 will have some compelling features.</li>
<li><a href="https://theta360.com/s/xuR4ogsjGmu584JJju0vUaTA">A 360° group picture</a> was taken after lunch, and then people split up into the working groups for the afternoon or started hacking in the UofO Henderson residence.</li>
<li>Benedict and Allan both attended the OpenZFS working group, lead by Matt Ahrens. He presented the completed and outstanding work in FreeBSD, without spoiling too much of the ZFS presentations of various people that happened later at the conference.</li>
<li>Benedict joined the boot code session a bit late (hallway track is the reason) when most things seem to have already been discussed.</li>
<li><a href="https://www.talegraph.com/tales/WmObSRejzT">BSDCan 2018 — Ottawa (In Pictures)</a></li>
<li><a href="https://photos.google.com/share/AF1QipPv_eOz9z-e8R23DkSEcMLF9ivl8est0H4k0lkAoIdY0Jgsn4eyKT54fPyy4EukCw?key=RmJoNS1uOHU2djRDdzZxNGM4ZEY1dFVKamhCNThR">iXsystems Photos from BSDCan 2018</a></li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://hardenedbsd.org/article/shawn-webb/2018-06-09/june-hardenedbsd-foundation-update">June HardenedBSD Foundation Update</a></p>

<blockquote>
<p>We at HardenedBSD are working towards starting up a 501©(3) not-for-profit organization in the USA. Setting up this organization will allow future donations to be tax deductible. We’ve made progress and would like to share with you the current state of affairs.</p>
</blockquote>

<blockquote>
<p>We have identified, sent invitations out, and received acceptance letters from six people who will serve on the HardenedBSD Foundation Board of Directors. You can find their bios below. In the latter half of June 2018 or the beginning half of July 2018, we will meet for the first time as a board and formally begin the process of creating the documentation needed to submit to the local, state, and federal tax services.</p>
</blockquote>

<blockquote>
<p>Here’s a brief introduction to those who will serve on the board:</p>
</blockquote>

<ul>
<li>
<p>W. Dean Freeman (Advisor): Dean has ten years of professional experience with deploying and security Unix and networking systems, including assessing systems security for government certification and assessing the efficacy of security products. He was introduced to Unix via FreeBSD 2.2.8 on an ISP shell account as a teenager. Formerly, he was the Snort port maintainer for FreeBSD while working in the Sourcefire VRT, and has contributed entropy-related patches to the FreeBSD and HardenedBSD projects – a topic on which he presented at vBSDCon 2017.</p>
</li>
<li>
<p>Ben La Monica (Advisor): Ben is a Senior Technology Manager of Software Engineering at Morningstar, Inc and has been developing software for over 15 years in a variety of languages. He advocates open source software and enjoys tinkering with electronics and home automation.</p>
</li>
<li>
<p>George Saylor (Advisor): George is a Technical Directory at G2, Inc. Mr. Saylor has over 28 years of information systems and security experience in a broad range of disciplines. His core focus areas are automation and standards in the event correlation space as well as penetration and exploitation of computer systems. Mr Saylor was also a co-founder of the OpenSCAP project.</p>
</li>
<li>
<p>Virginia Suydan (Accountant and general administrator): Accountant and general administrator for the HardenedBSD Foundation. She has worked with Shawn Webb for tax and accounting purposes for over six years.</p>
</li>
<li>
<p>Shawn Webb (Director): Co-founder of HardenedBSD and all-around infosec wonk. He has worked and played in the infosec industry, doing both offensive and defensive research, for around fifteen years. He loves open source technologies and likes to frustrate the bad guys.</p>
</li>
<li>
<p>Ben Welch (Advisor): Ben is currently a Security Engineer at G2, Inc. He graduated from Pennsylvania College of Technology with a Bachelors in Information Assurance and Security. Ben likes long walks, beaches, candlelight dinners, and attending various conferences like BSides and ShmooCon.</p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://medium.com/@cmacrae/your-own-vpn-with-openiked-openbsd-13d7abd3d1d4">Your own VPN with OpenIKED &amp; OpenBSD</a></p>

<blockquote>
<p>Remote connectivity to your home network is something I think a lot of people find desirable. Over the years, I’ve just established an SSH tunnel and use it as a SOCKS proxy, sending my traffic through that. It’s a nice solution for a “poor man’s VPN”, but it can be a bit clunky, and it’s not great having to expose SSH to the world, even if you make sure to lock everything down </p>
</blockquote>

<blockquote>
<p>I set out the other day to finally do it properly. I’d come across this great post by Gordon Turner: <a href="https://blog.gordonturner.com/2018/02/25/openbsd-6-2-vpn-endpoint-for-ios-and-macos/">OpenBSD 6.2 VPN Endpoint for iOS and macOS</a></p>
</blockquote>

<blockquote>
<p>Whilst it was exactly what I was looking for, it outlined how to set up an L2TP VPN. Really, I wanted IKEv2 for performance and security reasons (I won’t elaborate on this here, if you’re curious about the differences, there’s a lot of content out on the web explaining this).</p>
</blockquote>

<blockquote>
<p>The client systems I’d be using have native support for IKEv2 (iOS, macOS, other BSD systems). But, I couldn’t find any tutorials in the same vein.</p>
</blockquote>

<blockquote>
<p>So, let’s get stuck in!</p>
</blockquote>

<ul>
<li>A quick note ✍️</li>
</ul>

<blockquote>
<p>This guide will walk through the set up of an IKEv2 VPN using OpenIKED on OpenBSD. It will detail a “road warrior” configuration, and use a PSK (pre-shared-key) for authentication. I’m sure it can be easily adapted to work on any other platforms that OpenIKED is available on, but keep in mind my steps are specifically for OpenBSD.</p>
</blockquote>

<ul>
<li>Server Configuration</li>
</ul>

<blockquote>
<p>As with all my home infrastructure, I crafted this set-up declaratively. So, I had the deployment of the VM setup in Terraform (deployed on my private Triton cluster), and wrote the configuration in Ansible, then tied them together using radekg/terraform-provisioner-ansible.</p>
</blockquote>

<blockquote>
<p>One of the reasons I love Ansible is that its syntax is very simplistic, yet expressive. As such, I feel it fits very well into explaining these steps with snippets of the playbook I wrote.  I’ll link the full playbook a bit further down for those interested.</p>
</blockquote>

<ul>
<li>See the full article for the information on:</li>
<li>sysctl parameters</li>
<li>The naughty list (optional)</li>
<li>Configure the VPN network interface</li>
<li>Configure the firewall</li>
<li>Configure the iked service</li>
<li>Gateway configuration</li>
<li>Client configuration</li>
<li>Troubleshooting</li>
</ul>

<p><hr></p>

<p><strong>DigitalOcean</strong></p>

<p>###<a href="https://corrupted.io/2018/05/15/system76-free-bsd.html">FreeBSD on a System76 Galago Pro</a></p>

<blockquote>
<p>Hey all, It’s been a while since I last posted but I thought I would hammer something out here. My most recent purchase was a System76 Galago Pro. I thought, afer playing with POP! OS a bit, is there any reason I couldn’t get BSD on this thing. Turns out the answer is no, no there isnt and it works pretty decently.</p>
</blockquote>

<blockquote>
<p>To get some accounting stuff out of the way I tested this all on FreeBSD Head and 11.1, and all of it is valid as of May 10, 2018. Head is a fast moving target so some of this is only bound to improve.</p>
</blockquote>

<ul>
<li>
<p>The hardware</p>
</li>
<li>
<p>Intel Core i5 Gen 8</p>
</li>
<li>
<p>UHD Graphics 620</p>
</li>
<li>
<p>16 GB DDR4 Ram</p>
</li>
<li>
<p>RTL8411B PCI Express Card Reader</p>
</li>
<li>
<p>RTL8111 Gigabit ethernet controller</p>
</li>
<li>
<p>Intel HD Audio</p>
</li>
<li>
<p>Samsung SSD 960 PRO 512GB NVMe</p>
</li>
<li>
<p>The caveats</p>
</li>
</ul>

<blockquote>
<p>There are a few things that I cant seem to make work straight out of the box, and that is the SD Card reader, the backlight, and the audio is a bit finicky. Also the trackpad doesn’t respond to two finger scrolling. The wiki is mostly up to date, there are a few edits that need to be made still but there is a bug where I cant register an account yet so I haven’t made all the changes.</p>
</blockquote>

<ul>
<li>Processor</li>
</ul>

<blockquote>
<p>It works like any other Intel processor. Pstates and throttling work.</p>
</blockquote>

<ul>
<li>Graphics</li>
</ul>

<blockquote>
<p>The boot menu sets itself to what looks like 1024x768, but works as you expect in a tiny window. The text console does the full 3200x1800 resolution, but the text is ultra tiny. There isnt a font for the console that covers hidpi screens yet. As for X Windows it requres the drm-kmod-next package. Once installed follow the directions from the package and it works with almost no fuss. I have it running on X with full intel acceleration, but it is running at it’s full 3200x1800 resolution, to scale that down just do xrandr --output eDP-1 --scale 0.5x0.5 it will blow it up to roughly 200%. Due to limitations with X windows and hidpi it is harder to get more granular.</p>
</blockquote>

<ul>
<li>Intel Wireless 8265</li>
</ul>

<blockquote>
<p>The wireless uses the iwm module, as of right now it does not seem to automagically load right now. Adding iwm_load=“YES” will cause the module to load on boot and kldload iwm</p>
</blockquote>

<ul>
<li>Battery</li>
</ul>

<blockquote>
<p>I seem to be getting about 5 hours out of the battery, but everything reports out of the box as expected. I could get more by throttling the CPU down speed wise.</p>
</blockquote>

<ul>
<li>Overall impression</li>
</ul>

<blockquote>
<p>It is a pretty decent experience. While not as polished as a Thinkpad there is a lot of potential with a bit of work and polishing. The laptop itself is not bad, the keyboard is responsive. The build quality is pretty solid. My only real complaint is the trackpad is stiff to click and sort of tiny. They seem to be a bit indifferent to non linux OSes running on the gear but that isnt anything new. I wont have any problems using it and is enough that when I work through this laptop, but I’m not sure at this stage if my next machine will be a System76 laptop, but they have impressed me enough to put them in the running when I go to look for my next portable machine but it hasn’t yet replaced the hole left in my heart by lenovo messing with the thinkpad.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://undeadly.org/cgi?action=article;sid=20180418073437">Hardware accelerated AES/HMAC-SHA on octeons</a></p>

<pre><code>In this commit, visa@ submitted code (disabled for now) to use built-in acceleration on octeon CPUs, much like AESNI for x86s.

I decided to test tcpbench(1) and IPsec, before and after updating and enabling the octcrypto(4) driver.

I didn't capture detailed perf stats from before the update, I had heard someone say that Edgerouter Lite boxes would only do some 6MBit/s over ipsec, so I set up a really simple ipsec.conf with ike esp from A to B leading to a policy of

esp tunnel from A to B spi 0xdeadbeef auth hmac-sha2-256 enc aes
going from one ERL to another (I collect octeons, so I have a bunch to test with) and let tcpbench run for a while on it. My numbers hovered around 7Mbit/s, which coincided with what I've heard, and also that most of the CPU gets used while doing it.
Then I edited /sys/arch/octeon/conf/GENERIC, removed the # from octcrypto0 at mainbus0 and recompiled. Booted into the new kernel and got a octcrypto0 line in dmesg, and it was time to rock the ipsec tunnel again. The crypto algorithm and HMAC used by default on ipsec coincides nicely with the list of accelerated functions provided by the driver.

Before we get to tunnel traffic numbers, just one quick look at what systat pigs says while the ipsec is running at full steam:

     PID USER        NAME                 CPU     20\    40\    60\    80\  100\
   58917 root        crypto             52.25 #################
   42636 root        softnet            42.48 ##############
                     (idle)             29.74 #########
    1059 root        tcpbench           24.22 #######
   67777 root        crynlk             19.58 ######
So this indicates that the load from doing ipsec and generating the traffic is somewhat nicely evened out over the two cores in the Edgerouter, and there's even some CPU left unused, which means I can actually ssh into it and have it usable. I have had it running for almost 2 days now, moving some 2.1TB over the tunnel.
Now for the new and improved performance numbers:

   204452123        4740752       37.402  100.00% 
Conn:   1 Mbps:       37.402 Peak Mbps:       58.870 Avg Mbps:       37.402
   204453149        4692968       36.628  100.00% 
Conn:   1 Mbps:       36.628 Peak Mbps:       58.870 Avg Mbps:       36.628
   204454167        5405552       42.480  100.00% 
Conn:   1 Mbps:       42.480 Peak Mbps:       58.870 Avg Mbps:       42.480
   204455188        5202496       40.804  100.00% 
Conn:   1 Mbps:       40.804 Peak Mbps:       58.870 Avg Mbps:       40.804
   204456194        5062208       40.256  100.00% 
Conn:   1 Mbps:       40.256 Peak Mbps:       58.870 Avg Mbps:       40.256

The tcpbench numbers fluctuate up and down a bit, but the output is nice enough to actually keep tabs on the peak values. Peaking to 58.8MBit/s! Of course, as you can see, the average is lower but nice anyhow.

A manyfold increase in performance, which is good enough in itself, but also moves the throughput from a speed that would make a poor but cheap gateway to something actually useful and decent for many home network speeds. Biggest problem after this gets enabled will be that my options to buy cheap used ERLs diminish.
</code></pre>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="http://www.etinc.com/122/Using-FreeBSD-Text-Dumps">Using FreeBSD Text Dumps</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334391">llvm’s lld now the default linker for amd64 on FreeBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3194">Author Discoverability</a></li>
<li><a href="https://www.openbsd.org/papers/BeckPledgeUnveilBSDCan2018.pdf">Pledge and Unveil in OpenBSD {pdf}</a></li>
<li><a href="https://2018.eurobsdcon.org/call-for-papers/">EuroBSDCon 2018 CFP Closes June 17, hurry up and get your submissions in</a></li>
<li><a href="https://2018.eurobsdcon.org/paul-schenkeveld-travel-grant/">Just want to attend, but need help getting to the conference? Applications for the Paul Schenkeveld travel grant accepted until June 15th</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions</p>

<ul>
<li>Casey - <a href="http://dpaste.com/2H42V7W#wrap">ZFS on Digital Ocean</a></li>
<li>Jürgen - <a href="http://dpaste.com/3N7ZN8C#wrap">A Question</a></li>
<li>Kevin - <a href="http://dpaste.com/231CY5Z#wrap">Failover best practice</a></li>
<li>Dennis - <a href="http://dpaste.com/1QPNB25#wrap">SQL</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>TrueOS becoming a downstream fork with Trident, our BSDCan 2018 recap, HardenedBSD Foundation founding efforts, VPN with OpenIKED on OpenBSD, FreeBSD on a System76 Galago Pro, and hardware accelerated crypto on Octeons.</p>

<p>##Headlines##<br>
###<a href="https://www.trueos.org/blog/trueosdownstream/">TrueOS to Focus on Core Operating System</a></p>

<blockquote>
<p>The TrueOS Project has some big plans in the works, and we want to take a minute and share them with you. Many have come to know TrueOS as the “graphical FreeBSD” that makes things easy for newcomers to the BSDs. Today we’re announcing that TrueOS is shifting our focus a bit to become a cutting-edge operating system that keeps all of the stability that you know and love from ZFS (OpenZFS) and FreeBSD, and adds additional features to create a fresh, innovative operating system. Our goal is to create a core-centric operating system that is modular, functional, and perfect for do-it-yourselfers and advanced users alike.</p>
</blockquote>

<blockquote>
<p>TrueOS will become a downstream fork that will build on FreeBSD by integrating new software technologies like OpenRC and LibreSSL. Work has already begun which allows TrueOS to be used as a base platform for other projects, including JSON-based manifests, integrated Poudriere / pkg tools and much more. We’re planning on a six month release cycle to keep development moving and fresh, allowing us to bring you hot new features to ZFS, bhyve and related tools in a timely manner. This makes TrueOS the perfect fit to serve as the basis for building other distributions.</p>
</blockquote>

<blockquote>
<p>Some of you are probably asking yourselves “But what if I want to have a graphical desktop?” Don’t worry! We’re making sure that everyone who knows and loves the legacy desktop version of TrueOS will be able to continue using a FreeBSD-based, graphical operating system in the future. For instance, if you want to add KDE, just use sudo pkg install kde and voila! You have your new shiny desktop. Easy right? This allows us to get back to our roots of being a desktop agnostic operating system. If you want to add a new desktop environment, you get to pick the one that best suits your use.</p>
</blockquote>

<blockquote>
<p>We know that some of you will still be looking for an out-of-the-box solution similar to legacy PC-BSD and TrueOS. We’re happy to announce that Project Trident will take over graphical FreeBSD development going forward. Not much is going to change in that regard other than a new name! You’ll still have Lumina Desktop as a lightweight and feature-rich desktop environment and tons of utilities from the legacy TrueOS toolchain like sysadm and AppCafe. There will be migration paths available for those that would like to move to other FreeBSD-based distributions like Project Trident or GhostBSD.</p>
</blockquote>

<blockquote>
<p>We look forward to this new chapter for TrueOS and hope you will give the new edition a spin! Tell us what you think about the new changes by leaving us a comment. Don’t forget you can ask us questions on our Twitter and be a part of our community by joining the new TrueOS Forums when they go live in about a week. Thanks for being a loyal fan of TrueOS.</p>
</blockquote>

<p>###<a href="http://project-trident.org/faq">Project Trident FAQ</a></p>

<ul>
<li>Q: Why did you pick the name “Project Trident”?</li>
</ul>

<blockquote>
<p>A: We were looking for a name that was unique, yet would still relate to the BSD community. Since Beastie (the FreeBSD mascot) is always pictured with a trident, it felt like that would be a great name.</p>
</blockquote>

<ul>
<li>Q: Where can users go for technical support?</li>
</ul>

<blockquote>
<p>A: At the moment, Project Trident will continue sharing the TrueOS community forums and Telegram channels. We are currently evaluating dedicated options for support channels in the future.</p>
</blockquote>

<ul>
<li>Q: Can I help contribute to the project?</li>
</ul>

<blockquote>
<p>A: We are always looking for developers who want to join the project. If you’re not a developer you can still help, as a community project we will be more reliant on contributions from the community in the form of how-to guides and other user-centric documentation and support systems.</p>
</blockquote>

<ul>
<li>Q: How is the project supported financially?</li>
</ul>

<blockquote>
<p>A: Project Trident is sponsored by the community, from both individuals and corporations. iXsystems has stepped up as the first enterprise-level sponsor of the project, and has been instrumental in getting Project Trident up and running. Please visit the Sponsors page to see all the current sponsors.</p>
</blockquote>

<ul>
<li>Q: How can I help support the project financially?</li>
</ul>

<blockquote>
<p>A: Several methods exist, from one time or recurring donations via Paypal to limited time swag t-shirt campaigns during the year. We are also looking into more alternative methods of support, so please visit the Sponsors page to see all the current methods of sponsorship.</p>
</blockquote>

<ul>
<li>Q: Will there be any transparency of the financial donations and expenditures?</li>
</ul>

<blockquote>
<p>A: Yes, we will be totally open with how much money comes into the project and what it is spent on. Due to concerns of privacy, we will not identify individuals and their donation amounts unless they specifically request to be identified. We will release a monthly overview in/out ledger, so that community members can see where their money is going.</p>
</blockquote>

<ul>
<li>
<p>Relationship with TrueOS</p>
</li>
<li>
<p>Project Trident does have very close ties to the TrueOS project, since most of the original Project Trident developers were once part of the TrueOS project before it became a distribution platform. For users of the TrueOS desktop, we have some additional questions and answers below.</p>
</li>
<li>
<p>Q: Do we need to be at a certain TrueOS install level/release to upgrade?</p>
</li>
</ul>

<blockquote>
<p>A: As long as you have a TrueOS system which has been updated to at least the 18.03 release you should be able to just perform a system update to be automatically upgraded to Project Trident.</p>
</blockquote>

<ul>
<li>Q: Which members moved from TrueOS to Project Trident?</li>
</ul>

<blockquote>
<p>A: Project Trident is being led by prior members of the TrueOS desktop team. Ken and JT (development), Tim (documentation) and Rod (Community/Support). Since Project Trident is a community-first project, we look forward to working with new members of the team.</p>
</blockquote>

<p><hr></p>

<p><strong>iXsystems</strong></p>

<p>###<a href="https://www.bsdcan.org/2018">BSDCan</a></p>

<ul>
<li>BSDCan finished Saturday last week</li>
<li>It started with the GoatBoF on Tuesday at the Royal Oak Pub, where people had a chance to meet and greet. Benedict could not attend due to an all-day FreeBSD Foundation meeting and and even FreeBSD Journal Editorial Board meeting.</li>
<li>The FreeBSD devsummit was held the next two days in parallel to the tutorials. Gordon Tetlow, who organized the devsummit, opened the devsummit. Deb Goodkin from the FreeBSD Foundation gave the first talk with a Foundation update, highlighting current and future efforts. Li-Wen Hsu is now employed by the Foundation to assist in QA work (Jenkins, CI/CD) and Gordon Tetlow has a part-time contract to help secteam as their secretary.</li>
<li>Next, the FreeBSD core team (among them Allan and Benedict) gave a talk about what has happened this last term. With a core election currently running, some of these items will carry over to the next core team, but there were also some finished ones like the FCP process and FreeBSD members initiative. People in the audience asked questions on various topics of interest.</li>
<li>After the coffee break, the release engineering team gave a talk about their efforts in terms of making releases happen in time and good quality.</li>
<li>Benedict had to give his Ansible tutorial in the afternoon, which had roughly 15 people attending. Most of them beginners, we could get some good discussions going and I also learned a few new tricks. The overall feedback was positive and one even asked what I’m going to teach next year.</li>
<li>The second day of the FreeBSD devsummit began with Gordon Tetlow giving an insight into the FreeBSD Security team (aka secteam). He gave a overview of secteam members and responsibilities, explaining the process based on a long past advisory. Developers were encouraged to help out secteam. NDAs and proper disclosure of vulnerabilities were also discussed, and the audience had some feedback and questions.</li>
<li>When the coffee break was over, the FreeBSD 12.0 planning session happened. A <a href="https://wiki.freebsd.org/DevSummit/201806/HaveNeedWant12">Google doc</a> served as a collaborative way of gathering features and things left to do. People signed up for it or were volunteered. Some features won’t make it into 12.0 as they are not 100% ready for prime time and need a few more rounds of testing and bugfixing. Still, 12.0 will have some compelling features.</li>
<li><a href="https://theta360.com/s/xuR4ogsjGmu584JJju0vUaTA">A 360° group picture</a> was taken after lunch, and then people split up into the working groups for the afternoon or started hacking in the UofO Henderson residence.</li>
<li>Benedict and Allan both attended the OpenZFS working group, lead by Matt Ahrens. He presented the completed and outstanding work in FreeBSD, without spoiling too much of the ZFS presentations of various people that happened later at the conference.</li>
<li>Benedict joined the boot code session a bit late (hallway track is the reason) when most things seem to have already been discussed.</li>
<li><a href="https://www.talegraph.com/tales/WmObSRejzT">BSDCan 2018 — Ottawa (In Pictures)</a></li>
<li><a href="https://photos.google.com/share/AF1QipPv_eOz9z-e8R23DkSEcMLF9ivl8est0H4k0lkAoIdY0Jgsn4eyKT54fPyy4EukCw?key=RmJoNS1uOHU2djRDdzZxNGM4ZEY1dFVKamhCNThR">iXsystems Photos from BSDCan 2018</a></li>
</ul>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://hardenedbsd.org/article/shawn-webb/2018-06-09/june-hardenedbsd-foundation-update">June HardenedBSD Foundation Update</a></p>

<blockquote>
<p>We at HardenedBSD are working towards starting up a 501©(3) not-for-profit organization in the USA. Setting up this organization will allow future donations to be tax deductible. We’ve made progress and would like to share with you the current state of affairs.</p>
</blockquote>

<blockquote>
<p>We have identified, sent invitations out, and received acceptance letters from six people who will serve on the HardenedBSD Foundation Board of Directors. You can find their bios below. In the latter half of June 2018 or the beginning half of July 2018, we will meet for the first time as a board and formally begin the process of creating the documentation needed to submit to the local, state, and federal tax services.</p>
</blockquote>

<blockquote>
<p>Here’s a brief introduction to those who will serve on the board:</p>
</blockquote>

<ul>
<li>
<p>W. Dean Freeman (Advisor): Dean has ten years of professional experience with deploying and security Unix and networking systems, including assessing systems security for government certification and assessing the efficacy of security products. He was introduced to Unix via FreeBSD 2.2.8 on an ISP shell account as a teenager. Formerly, he was the Snort port maintainer for FreeBSD while working in the Sourcefire VRT, and has contributed entropy-related patches to the FreeBSD and HardenedBSD projects – a topic on which he presented at vBSDCon 2017.</p>
</li>
<li>
<p>Ben La Monica (Advisor): Ben is a Senior Technology Manager of Software Engineering at Morningstar, Inc and has been developing software for over 15 years in a variety of languages. He advocates open source software and enjoys tinkering with electronics and home automation.</p>
</li>
<li>
<p>George Saylor (Advisor): George is a Technical Directory at G2, Inc. Mr. Saylor has over 28 years of information systems and security experience in a broad range of disciplines. His core focus areas are automation and standards in the event correlation space as well as penetration and exploitation of computer systems. Mr Saylor was also a co-founder of the OpenSCAP project.</p>
</li>
<li>
<p>Virginia Suydan (Accountant and general administrator): Accountant and general administrator for the HardenedBSD Foundation. She has worked with Shawn Webb for tax and accounting purposes for over six years.</p>
</li>
<li>
<p>Shawn Webb (Director): Co-founder of HardenedBSD and all-around infosec wonk. He has worked and played in the infosec industry, doing both offensive and defensive research, for around fifteen years. He loves open source technologies and likes to frustrate the bad guys.</p>
</li>
<li>
<p>Ben Welch (Advisor): Ben is currently a Security Engineer at G2, Inc. He graduated from Pennsylvania College of Technology with a Bachelors in Information Assurance and Security. Ben likes long walks, beaches, candlelight dinners, and attending various conferences like BSides and ShmooCon.</p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://medium.com/@cmacrae/your-own-vpn-with-openiked-openbsd-13d7abd3d1d4">Your own VPN with OpenIKED &amp; OpenBSD</a></p>

<blockquote>
<p>Remote connectivity to your home network is something I think a lot of people find desirable. Over the years, I’ve just established an SSH tunnel and use it as a SOCKS proxy, sending my traffic through that. It’s a nice solution for a “poor man’s VPN”, but it can be a bit clunky, and it’s not great having to expose SSH to the world, even if you make sure to lock everything down </p>
</blockquote>

<blockquote>
<p>I set out the other day to finally do it properly. I’d come across this great post by Gordon Turner: <a href="https://blog.gordonturner.com/2018/02/25/openbsd-6-2-vpn-endpoint-for-ios-and-macos/">OpenBSD 6.2 VPN Endpoint for iOS and macOS</a></p>
</blockquote>

<blockquote>
<p>Whilst it was exactly what I was looking for, it outlined how to set up an L2TP VPN. Really, I wanted IKEv2 for performance and security reasons (I won’t elaborate on this here, if you’re curious about the differences, there’s a lot of content out on the web explaining this).</p>
</blockquote>

<blockquote>
<p>The client systems I’d be using have native support for IKEv2 (iOS, macOS, other BSD systems). But, I couldn’t find any tutorials in the same vein.</p>
</blockquote>

<blockquote>
<p>So, let’s get stuck in!</p>
</blockquote>

<ul>
<li>A quick note ✍️</li>
</ul>

<blockquote>
<p>This guide will walk through the set up of an IKEv2 VPN using OpenIKED on OpenBSD. It will detail a “road warrior” configuration, and use a PSK (pre-shared-key) for authentication. I’m sure it can be easily adapted to work on any other platforms that OpenIKED is available on, but keep in mind my steps are specifically for OpenBSD.</p>
</blockquote>

<ul>
<li>Server Configuration</li>
</ul>

<blockquote>
<p>As with all my home infrastructure, I crafted this set-up declaratively. So, I had the deployment of the VM setup in Terraform (deployed on my private Triton cluster), and wrote the configuration in Ansible, then tied them together using radekg/terraform-provisioner-ansible.</p>
</blockquote>

<blockquote>
<p>One of the reasons I love Ansible is that its syntax is very simplistic, yet expressive. As such, I feel it fits very well into explaining these steps with snippets of the playbook I wrote.  I’ll link the full playbook a bit further down for those interested.</p>
</blockquote>

<ul>
<li>See the full article for the information on:</li>
<li>sysctl parameters</li>
<li>The naughty list (optional)</li>
<li>Configure the VPN network interface</li>
<li>Configure the firewall</li>
<li>Configure the iked service</li>
<li>Gateway configuration</li>
<li>Client configuration</li>
<li>Troubleshooting</li>
</ul>

<p><hr></p>

<p><strong>DigitalOcean</strong></p>

<p>###<a href="https://corrupted.io/2018/05/15/system76-free-bsd.html">FreeBSD on a System76 Galago Pro</a></p>

<blockquote>
<p>Hey all, It’s been a while since I last posted but I thought I would hammer something out here. My most recent purchase was a System76 Galago Pro. I thought, afer playing with POP! OS a bit, is there any reason I couldn’t get BSD on this thing. Turns out the answer is no, no there isnt and it works pretty decently.</p>
</blockquote>

<blockquote>
<p>To get some accounting stuff out of the way I tested this all on FreeBSD Head and 11.1, and all of it is valid as of May 10, 2018. Head is a fast moving target so some of this is only bound to improve.</p>
</blockquote>

<ul>
<li>
<p>The hardware</p>
</li>
<li>
<p>Intel Core i5 Gen 8</p>
</li>
<li>
<p>UHD Graphics 620</p>
</li>
<li>
<p>16 GB DDR4 Ram</p>
</li>
<li>
<p>RTL8411B PCI Express Card Reader</p>
</li>
<li>
<p>RTL8111 Gigabit ethernet controller</p>
</li>
<li>
<p>Intel HD Audio</p>
</li>
<li>
<p>Samsung SSD 960 PRO 512GB NVMe</p>
</li>
<li>
<p>The caveats</p>
</li>
</ul>

<blockquote>
<p>There are a few things that I cant seem to make work straight out of the box, and that is the SD Card reader, the backlight, and the audio is a bit finicky. Also the trackpad doesn’t respond to two finger scrolling. The wiki is mostly up to date, there are a few edits that need to be made still but there is a bug where I cant register an account yet so I haven’t made all the changes.</p>
</blockquote>

<ul>
<li>Processor</li>
</ul>

<blockquote>
<p>It works like any other Intel processor. Pstates and throttling work.</p>
</blockquote>

<ul>
<li>Graphics</li>
</ul>

<blockquote>
<p>The boot menu sets itself to what looks like 1024x768, but works as you expect in a tiny window. The text console does the full 3200x1800 resolution, but the text is ultra tiny. There isnt a font for the console that covers hidpi screens yet. As for X Windows it requres the drm-kmod-next package. Once installed follow the directions from the package and it works with almost no fuss. I have it running on X with full intel acceleration, but it is running at it’s full 3200x1800 resolution, to scale that down just do xrandr --output eDP-1 --scale 0.5x0.5 it will blow it up to roughly 200%. Due to limitations with X windows and hidpi it is harder to get more granular.</p>
</blockquote>

<ul>
<li>Intel Wireless 8265</li>
</ul>

<blockquote>
<p>The wireless uses the iwm module, as of right now it does not seem to automagically load right now. Adding iwm_load=“YES” will cause the module to load on boot and kldload iwm</p>
</blockquote>

<ul>
<li>Battery</li>
</ul>

<blockquote>
<p>I seem to be getting about 5 hours out of the battery, but everything reports out of the box as expected. I could get more by throttling the CPU down speed wise.</p>
</blockquote>

<ul>
<li>Overall impression</li>
</ul>

<blockquote>
<p>It is a pretty decent experience. While not as polished as a Thinkpad there is a lot of potential with a bit of work and polishing. The laptop itself is not bad, the keyboard is responsive. The build quality is pretty solid. My only real complaint is the trackpad is stiff to click and sort of tiny. They seem to be a bit indifferent to non linux OSes running on the gear but that isnt anything new. I wont have any problems using it and is enough that when I work through this laptop, but I’m not sure at this stage if my next machine will be a System76 laptop, but they have impressed me enough to put them in the running when I go to look for my next portable machine but it hasn’t yet replaced the hole left in my heart by lenovo messing with the thinkpad.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://undeadly.org/cgi?action=article;sid=20180418073437">Hardware accelerated AES/HMAC-SHA on octeons</a></p>

<pre><code>In this commit, visa@ submitted code (disabled for now) to use built-in acceleration on octeon CPUs, much like AESNI for x86s.

I decided to test tcpbench(1) and IPsec, before and after updating and enabling the octcrypto(4) driver.

I didn't capture detailed perf stats from before the update, I had heard someone say that Edgerouter Lite boxes would only do some 6MBit/s over ipsec, so I set up a really simple ipsec.conf with ike esp from A to B leading to a policy of

esp tunnel from A to B spi 0xdeadbeef auth hmac-sha2-256 enc aes
going from one ERL to another (I collect octeons, so I have a bunch to test with) and let tcpbench run for a while on it. My numbers hovered around 7Mbit/s, which coincided with what I've heard, and also that most of the CPU gets used while doing it.
Then I edited /sys/arch/octeon/conf/GENERIC, removed the # from octcrypto0 at mainbus0 and recompiled. Booted into the new kernel and got a octcrypto0 line in dmesg, and it was time to rock the ipsec tunnel again. The crypto algorithm and HMAC used by default on ipsec coincides nicely with the list of accelerated functions provided by the driver.

Before we get to tunnel traffic numbers, just one quick look at what systat pigs says while the ipsec is running at full steam:

     PID USER        NAME                 CPU     20\    40\    60\    80\  100\
   58917 root        crypto             52.25 #################
   42636 root        softnet            42.48 ##############
                     (idle)             29.74 #########
    1059 root        tcpbench           24.22 #######
   67777 root        crynlk             19.58 ######
So this indicates that the load from doing ipsec and generating the traffic is somewhat nicely evened out over the two cores in the Edgerouter, and there's even some CPU left unused, which means I can actually ssh into it and have it usable. I have had it running for almost 2 days now, moving some 2.1TB over the tunnel.
Now for the new and improved performance numbers:

   204452123        4740752       37.402  100.00% 
Conn:   1 Mbps:       37.402 Peak Mbps:       58.870 Avg Mbps:       37.402
   204453149        4692968       36.628  100.00% 
Conn:   1 Mbps:       36.628 Peak Mbps:       58.870 Avg Mbps:       36.628
   204454167        5405552       42.480  100.00% 
Conn:   1 Mbps:       42.480 Peak Mbps:       58.870 Avg Mbps:       42.480
   204455188        5202496       40.804  100.00% 
Conn:   1 Mbps:       40.804 Peak Mbps:       58.870 Avg Mbps:       40.804
   204456194        5062208       40.256  100.00% 
Conn:   1 Mbps:       40.256 Peak Mbps:       58.870 Avg Mbps:       40.256

The tcpbench numbers fluctuate up and down a bit, but the output is nice enough to actually keep tabs on the peak values. Peaking to 58.8MBit/s! Of course, as you can see, the average is lower but nice anyhow.

A manyfold increase in performance, which is good enough in itself, but also moves the throughput from a speed that would make a poor but cheap gateway to something actually useful and decent for many home network speeds. Biggest problem after this gets enabled will be that my options to buy cheap used ERLs diminish.
</code></pre>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="http://www.etinc.com/122/Using-FreeBSD-Text-Dumps">Using FreeBSD Text Dumps</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=334391">llvm’s lld now the default linker for amd64 on FreeBSD</a></li>
<li><a href="https://blather.michaelwlucas.com/archives/3194">Author Discoverability</a></li>
<li><a href="https://www.openbsd.org/papers/BeckPledgeUnveilBSDCan2018.pdf">Pledge and Unveil in OpenBSD {pdf}</a></li>
<li><a href="https://2018.eurobsdcon.org/call-for-papers/">EuroBSDCon 2018 CFP Closes June 17, hurry up and get your submissions in</a></li>
<li><a href="https://2018.eurobsdcon.org/paul-schenkeveld-travel-grant/">Just want to attend, but need help getting to the conference? Applications for the Paul Schenkeveld travel grant accepted until June 15th</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions</p>

<ul>
<li>Casey - <a href="http://dpaste.com/2H42V7W#wrap">ZFS on Digital Ocean</a></li>
<li>Jürgen - <a href="http://dpaste.com/3N7ZN8C#wrap">A Question</a></li>
<li>Kevin - <a href="http://dpaste.com/231CY5Z#wrap">Failover best practice</a></li>
<li>Dennis - <a href="http://dpaste.com/1QPNB25#wrap">SQL</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>81: Puffy in a Box</title>
  <link>https://www.bsdnow.tv/81</link>
  <guid isPermaLink="false">a8a11e67-acad-44db-b8d9-840c53f401f9</guid>
  <pubDate>Wed, 18 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a8a11e67-acad-44db-b8d9-840c53f401f9.mp3" length="62032180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Using OpenBGPD to distribute pf table updates (http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers)
For those not familiar, OpenBGPD (https://en.wikipedia.org/wiki/OpenBGPD) is a daemon for the Border Gateway Protocol (https://en.wikipedia.org/wiki/Border_Gateway_Protocol) - a way for routers on the internet to discover and exchange routes to different addresses
This post, inspired by a talk about using BGP to distribute spam lists (https://www.youtube.com/watch?v=Vet0eQB00X0), details how to use the protocol to distribute some other useful lists and information
It begins with "One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems."
If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files
OpenBGPD is part of the OpenBSD base system, but there's also an unofficial port to FreeBSD (https://www.freshports.org/net/openbgpd/) and a "work in progress" pkgsrc version (http://pkgsrc.se/wip/openbgpd)
***
Mounting removable media with autofs (http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html)
The FreeBSD foundation has a new article in the "FreeBSD from the trenches" series, this time about the sponsored autofs (https://www.freebsd.org/cgi/man.cgi?query=autofs&amp;amp;sektion=5) tool
It's written by one of the autofs developers, and he details his work on creating and using the utility
"The purpose of autofs(5) is to mount filesystems on access, in a way that's transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes."
He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives
It ends with a real-world example of something we're all probably familiar with: plugging in USB drives and watching the magic happen
There's also some more advanced bonus material on GEOM classes and all the more technical details
***
The Tor Browser on BSD (http://trac.haqistan.net/blog/adventures-ports-tor-browser)
The Tor Project has provided a "browser bundle (https://www.torproject.org/projects/torbrowser/design/)" for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source
Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost 
It has, however, only been released for Windows, OS X and Linux - no BSD version
"[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves."
Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started
If you've got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***
OpenSSH 6.8 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html)
Continuing their "tick tock" pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it's a major upgrade, focused on new features (we like those better of course)
Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability
This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints
Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys
You can now require multiple, different public keys to be verified for a user to authenticate (useful if you're extra paranoid or don't have 100% confidence in any single key type)
The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon
Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***
NetBSD at AsiaBSDCon (https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html)
The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you'd expect
It covers their BoF session, the six NetBSD-related presentations and finally their "work in progress" session
There was a grand total of 34 different NetBSD gadgets (https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0) on display at the event
***
Interview - Lawrence Teo - lteo@openbsd.org (mailto:lteo@openbsd.org) / @lteo (https://twitter.com/lteo)
OpenBSD at Calyptix (http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf)
News Roundup
HardenedBSD introduces Integriforce (http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce)
A little bit of background on this one first: NetBSD has something called veriexec (https://www.netbsd.org/docs/guide/en/chap-veriexec.html), used for checking file integrity (http://wiki.netbsd.org/guide/veriexec/) at the kernel level
By doing it at the kernel level, similar to securelevels (https://en.wikipedia.org/wiki/Securelevel), it offers some level of protection even when the root account is compromised
HardenedBSD has introduced a similar mechanism into their "secadm" utility
You can list binaries in the config file that you want to be protected from changes, then specify whether those can't be run (http://i.imgur.com/wHp2eAN.png) at all, or if they just print a warning
They're looking for some more extensive testing of this new feature
***
More s2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150305100712&amp;amp;mode=flat)
A couple more Australian hackathon reports have poured in since the last time
The first comes from Jonathan Gray, who's done a lot of graphics-related work in OpenBSD recently
He worked on getting some newer "Southern Islands" and "Graphics Core Next" AMD GPUs working, as well as some OpenGL and DRM-related things
Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man)
Ted Unangst also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150307165135&amp;amp;mode=flat) to detail what he hacked on at the event
With a strong focus on improving SMP scalability, he tackled the virtual memory layer
His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8
All the trip reports are much more detailed than our short summaries, so give them a read if you're interested in all the technicalities
***
DragonFly 4.0.4 and IPFW3 (https://www.dragonflydigest.com/2015/03/10/15733.html)
DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4
It includes a minor list of fixes (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html), some of which include a HAMMER FS history fix, removing the no-longer-needed "new xorg" and "with kms" variables and a few LAGG fixes
There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version
Shortly after it was released, their new IPFW2 firewall was added to the tree (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html) and subsequently renamed to IPFW3 (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html) (since it's technically the third revision)
***
NetBSD gets Raspberry Pi 2 support (https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added)
NetBSD has announced initial support for the second revision (http://www.raspberrypi.org/products/raspberry-pi-2-model-b/) of the ever-popular Raspberry Pi board
There are -current snapshots available for download, and multiprocessor support is also on the way
The NetBSD wiki page about the Raspberry Pi also has some more information (https://wiki.netbsd.org/ports/evbarm/raspberry_pi/) and an installation guide
The usual Hacker News discussion (https://news.ycombinator.com/item?id=9172100) on the subject
If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***
OpenIKED as a VPN gateway (http://puffysecurity.com/wiki/openikedoffshore.html)
In our first discussion segment, we talked about a few different ways to tunnel your traffic
While we've done full tutorials on things like SSH tunnels (http://www.bsdnow.tv/tutorials/stunnel), OpenVPN (http://www.bsdnow.tv/tutorials/openvpn) and Tor (http://www.bsdnow.tv/tutorials/tor), we haven't talked a whole lot about OpenBSD's IPSEC suite
This article should help fill that gap - it walks you through the complete IKED setup
From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide's got it all
***
Feedback/Questions
Gary writes in (http://slexy.org/view/s21G9TWALE)
Robert writes in (http://slexy.org/view/s206aZrxOi)
Joris writes in (http://slexy.org/view/s28Um5R7LG)
Mike writes in (http://slexy.org/view/s2yAJsl1Es)
Anders writes in (http://slexy.org/view/s21dMAE55M)
***
Mailing List Gold
Can you hear me now (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142577632205484&amp;amp;w=2)
He must be GNU here (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html)
I've seen some... (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142593175408756&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, calyptix, router, gateway, pfsense, opnsense, smb, asiabsdcon, 2015, openbgpd, openiked, hardenedbsd, tor, vpn, autofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>76: Time for a Change</title>
  <link>https://www.bsdnow.tv/76</link>
  <guid isPermaLink="false">b872a625-f3d6-477b-b162-fd4248aef998</guid>
  <pubDate>Wed, 11 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b872a625-f3d6-477b-b162-fd4248aef998.mp3" length="64285204" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:29:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Strange timer bug in FreeBSD 11 (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html)
Peter Wemm (http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure) wrote in to the FreeBSD -CURRENT mailing list with an interesting observation
Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime
This meant things like cron and sleep would break, TCP/IP wouldn't time out or resend packets, a lot of things would break
A workaround until it was fixed was to reboot every 24 days, but this is BSD we're talking about - uptime is our game
An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap
Peter disagreed and gave some background (https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html), offering a different patch to fix (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html) the issue and detect it early (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html) if it happens again
Ultimately, the problem was traced back to an issue with a recent clang import
It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***
An OpenBSD mail server (http://technoquarter.blogspot.com/p/series.html)
There's been a recent influx of blog posts about building a BSD mail server for some reason
In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux
In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin
It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd
That means this is more of a "complete solution" - right down to what the end users see
The series is split up into categories so it's very easy to follow along step-by-step
***
How DragonFlyBSD uses git (http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html)
DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code
In a series (http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html) of posts (http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html), Matthew Dillon (the project lead) details their internal setup
They're using vanilla git over ssh, with the developers' accounts set to git-only (no shell access)
The maintainers of the server are the only ones with shell access available
He also details how a cron job syncs from the master to a public box that anyone can check out code from
It would be interesting to hear about how other BSD projects manage their master source repository
***
Why not try PCBSD? (http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd)
ITwire, another more mainstream tech site, published a recent article about switching to PCBSD
They interview a guy named Kris that we've never heard of before
In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same
"With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD."
If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***
Interview - Henning Brauer - henning@openbsd.org (mailto:henning@openbsd.org) / @henningbrauer (https://twitter.com/henningbrauer)
OpenNTPD (http://openntpd.org/) and its portable variant
News Roundup
Authenticated time in OpenNTPD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142356166731390&amp;amp;w=2)
We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated already
While at the hackathon, some developers came up with an alternate way (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142355043928397&amp;amp;w=2) to get authenticated NTP responses
You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool
OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header
It's not intended to be a direct time source, just a constraint to keep things within reason
If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid
Henning (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363215730069&amp;amp;w=2) and Theo (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363400330522&amp;amp;w=2) also weigh in to give some of the backstory on the idea
Lots more detail can be found in Reyk's email explaining the new feature (and it's optional of course)
***
NetBSD at Open Source Conference 2015 Oita and Hamanako (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html)
It's been a while since we've featured one of these trip reports, but the Japanese NetBSD users group is still doing them
This time the conferences were in Oita and Hamanako (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html), Japan
Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices
As always, they took lots of pictures from the event of NetBSD on all these weird machines
***
Poudriere in a jail (http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/)
A common question we get about our poudriere tutorial (http://www.bsdnow.tv/tutorials/poudriere) is "how do I run it in a jail?" - this blog post is about exactly that
It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***
Bruteblock, another way to stop bruteforce (http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh)
We've mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf's built-in rate limiting
Bruteblock is a similar tool, but it's not just for ssh logins - it can do a number of other services
It can also work directly with IPFW, which is a plus if you're using that as your firewall
Add a few lines to your syslog.conf and bruteblock will get executed automatically
The rest of the article takes you through the different settings you can configure for blocking
***
New iwm(4) driver and cross-polination (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142325218626853&amp;amp;w=2)
The OpenBSD guys recently imported a new "iwm" driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)
NetBSD wasted no time in porting it over (https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html), giving a bit of interesting backstory
According to Antti Kantee (http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction), "it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace"
Both projects would appreciate further testing if you have the hardware and can provide useful bug reports
Maybe FreeBSD and DragonFly will port it over too, or come up with something that's partially based on the code
***
PCBSD current images (http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/)
The first PCBSD -CURRENT images should be available this weekend
This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates
For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2E4NbJwzs)
Richard writes in (http://slexy.org/view/s2FkxcSYKy)
Charlie writes in (http://slexy.org/view/s217EgA1JC)
Ben writes in (http://slexy.org/view/s21vlCbGDt)
***
Mailing List Gold
A systematic effort (https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html)
GCC's lunch (https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html)
Hopes and dreams (https://marc.info/?l=openbsd-cvs&amp;amp;m=142331891908776&amp;amp;w=2)
***
Discussion
Comparison of ways to securely tunnel your traffic
OpenVPN (https://openvpn.net/index.php/open-source.html), OpenBSD IKED (http://www.openiked.org/), FreeBSD IPSEC (https://www.freebsd.org/doc/handbook/ipsec.html), OpenSSH (http://www.openssh.com/), Tor (https://www.torproject.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ntp, ntpd, ntimed, openntpd, time keeping, stratum, ipsec, openvpn, ssh, openiked, ike, tor, tunneling, bhws, afl-fuzz, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>61: IPSECond Wind</title>
  <link>https://www.bsdnow.tv/61</link>
  <guid isPermaLink="false">a0bfab13-8167-4b68-b1de-74122013593a</guid>
  <pubDate>Wed, 29 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0bfab13-8167-4b68-b1de-74122013593a.mp3" length="53960980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD panel at Phoenix LUG (https://www.youtube.com/watch?v=3AOF7fm-TJ0)
The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD
It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience
They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy
It was a good "real world" example of things potential switchers are curious to know about
They closed by concluding that more diversity is always better, and even if you've got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***
Book of PF signed copy auction (http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html)
Peter Hansteen (who we've had on the show (http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall)) is auctioning off the first signed copy of the new Book of PF
All the profits from the sale will go to the OpenBSD Foundation (http://www.openbsd.org/donations.html)
The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD's versions (which still use ALTQ, among other differences)
If you're interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause
Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) has challenged Peter (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141429413908567&amp;amp;w=2) to raise more for the foundation than his last book selling - let's see who wins
Pause the episode, go bid on it (http://www.ebay.com/itm/321563281902) and then come back!
***
FreeBSD Foundation goes to EuroBSDCon (http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html)
Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report
They also sponsored four other developers to go
The foundation was there "to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD"
They also have a second report (http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html) from Kamil Czekirda
A total of $2000 was raised at the conference
***
OpenBSD 5.6 released (http://www.openbsd.org/56.html)
Note: we're doing this story a couple days early - it's actually being released on November 1st (this Saturday), but we have next week off and didn't want to let this one slip through the cracks - it may be out by the time you're watching this
Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6
It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features
5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it
You can now hibernate your laptop when using a fully-encrypted filesystem (see our tutorial (http://www.bsdnow.tv/tutorials/fde) for that)
ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed
This will serve as a "transitional" release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to httpd (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) and from BIND to Unbound
Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions
As always, 5.6 comes with its own song and artwork (http://www.openbsd.org/lyrics.html#56) - the theme this time was obviously LibreSSL
Be sure to check the full changelog (http://www.openbsd.org/plus56.html) (it's huge) and pick up a CD or tshirt (http://www.openbsd.org/orders.html) to support their efforts
If you don't already have the public key releases are signed with, getting a physical CD is a good "out of bounds" way to obtain it safely
Here are some cool images of the set (https://imgur.com/a/5PtFe)
After you do your installation or upgrade (http://www.openbsd.org/faq/upgrade56.html), don't forget to head over to the errata page (http://www.openbsd.org/errata56.html) and apply any patches listed there
***
Interview - John-Mark Gurney - jmg@freebsd.org (mailto:jmg@freebsd.org) / @encthenet (https://twitter.com/encthenet)
Updating FreeBSD's IPSEC stack
News Roundup
Clang in DragonFly BSD (https://www.dragonflydigest.com/2014/10/22/14942.html)
As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64
Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly
We'd love to see more BSDs switch to Clang/LLVM eventually, it's a lot more modern than the old GCC most are using
***
reallocarray(): integer overflow detection for free (http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/)
One of the less obvious features in OpenBSD 5.6 is a new libc function: "reallocarray()"
It's a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost
Theo and a few other developers have already started (https://secure.freshbsd.org/search?project=openbsd&amp;amp;q=reallocarray) a mass audit of the entire source tree, replacing many instances with this new feature
OpenBSD's explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***
Switching from Linux blog (http://bothsidesofthence.tumblr.com/)
A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux
After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)
So far, he's put up a few posts about his initial thoughts, some documentation he's going through and his experiments so far
It'll be an ongoing series, so we may check back in with him again later on
***
Owncloud in a FreeNAS jail (https://www.youtube.com/watch?v=z6VQwOl4wE4)
One of the most common emails we get is about running Owncloud in FreeNAS
Now, finally, someone made a video on how to do just that, and it's even jailed
A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend
If you're looking for an easy way to back up and sync your files, this might be worth a watch
***
Feedback/Questions
Ernõ writes in (http://slexy.org/view/s2XEsQdggZ)
David writes in (http://slexy.org/view/s21EizH2aR)
Kamil writes in (http://slexy.org/view/s24SAJ5im6)
Torsten writes in (http://slexy.org/view/s20ABZe0RD)
Dominik writes in (http://slexy.org/view/s208jQs9c6)
***
Mailing List Gold
That's not our IP (https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html)
Is this thing on? (https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ipsec, aes, gcm, chacha20, encryption, netsec, ike, openiked, infosec, 5.6, openhttpd, opensmtpd, meetbsd, book of pf, libressl, freenas, owncloud</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
