<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 01 May 2026 00:34:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Openssl”</title>
    <link>https://www.bsdnow.tv/tags/openssl</link>
    <pubDate>Thu, 10 Dec 2020 06:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>380: Early ZFS-mas</title>
  <link>https://www.bsdnow.tv/380</link>
  <guid isPermaLink="false">ee24cdc7-bb47-400d-8be0-968efefa4e15</guid>
  <pubDate>Thu, 10 Dec 2020 06:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ee24cdc7-bb47-400d-8be0-968efefa4e15.mp3" length="43761336" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</itunes:subtitle>
  <itunes:duration>43:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
3rd Quarter FreeBSD Report (https://www.freebsd.org/news/status/report-2020-07-2020-09.html)
The call for submissions for the 4th Quarter is out (https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html)
OpenZFS 2.0 (https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/)
This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between "ZFS on Linux" and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.
News Roundup
Revision 367034 (https://svnweb.freebsd.org/changeset/base/367034)
Various new check-hash checks have been added to the UFS filesystem
over various major releases. Superblock check hashes were added for
the 12 release and cylinder-group and inode check hashes will appear
in the 13 release.
OpenSSL 3.0 /dev/crypto issues on FreeBSD (https://rubenerd.com/openssl-3-written-to-break-on-freebsd/)
So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.
OS108-9.1 XFCE amd64 released (https://forums.os108.org/d/32-os108-91-xfce-amd64-released)
OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&amp;gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, http://www.netbsd.org/docs/guide/en/part-install.html
Installation Video (https://youtu.be/cgAeY21gXR4)
***
Beastie Bits
OpenBGPD 6.8p1 portable: released Nov 5th, 2020 (http://www.openbgpd.org/ftp.html)
IRC Awk Bot (http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/)
Docker on FreeBSD using bhyve and sshfs (https://www.youtube.com/watch?v=ZVkJZJEdZNY)
The UNIX Command Language (1976) (https://github.com/susam/tucl)
***
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
santi - openrc (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md)
trond - python2 and mailman (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, status, report, third quarter 2020, openzfs 2.0, check hash, ufs, openssl, os108-9.1, xfce</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-07-2020-09.html" rel="nofollow">3rd Quarter FreeBSD Report</a></h3>

<blockquote>
<p><a href="https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html" rel="nofollow">The call for submissions for the 4th Quarter is out</a></p>

<hr>
</blockquote>

<h3><a href="https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/" rel="nofollow">OpenZFS 2.0</a></h3>

<blockquote>
<p>This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between &quot;ZFS on Linux&quot; and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/367034" rel="nofollow">Revision 367034</a></h3>

<blockquote>
<p>Various new check-hash checks have been added to the UFS filesystem<br>
over various major releases. Superblock check hashes were added for<br>
the 12 release and cylinder-group and inode check hashes will appear<br>
in the 13 release.</p>

<hr>

<h3><a href="https://rubenerd.com/openssl-3-written-to-break-on-freebsd/" rel="nofollow">OpenSSL 3.0 /dev/crypto issues on FreeBSD</a></h3>

<p>So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://forums.os108.org/d/32-os108-91-xfce-amd64-released" rel="nofollow">OS108-9.1 XFCE amd64 released</a></h3>

<ul>
<li>OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, <a href="http://www.netbsd.org/docs/guide/en/part-install.html" rel="nofollow">http://www.netbsd.org/docs/guide/en/part-install.html</a></li>
<li><a href="https://youtu.be/cgAeY21gXR4" rel="nofollow">Installation Video</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.openbgpd.org/ftp.html" rel="nofollow">OpenBGPD 6.8p1 portable: released Nov 5th, 2020</a></li>
<li><a href="http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/" rel="nofollow">IRC Awk Bot</a></li>
<li><a href="https://www.youtube.com/watch?v=ZVkJZJEdZNY" rel="nofollow">Docker on FreeBSD using bhyve and sshfs</a></li>
<li><a href="https://github.com/susam/tucl" rel="nofollow">The UNIX Command Language (1976)</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md" rel="nofollow">santi - openrc</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs" rel="nofollow">trond - python2 and mailman</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-07-2020-09.html" rel="nofollow">3rd Quarter FreeBSD Report</a></h3>

<blockquote>
<p><a href="https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html" rel="nofollow">The call for submissions for the 4th Quarter is out</a></p>

<hr>
</blockquote>

<h3><a href="https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/" rel="nofollow">OpenZFS 2.0</a></h3>

<blockquote>
<p>This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between &quot;ZFS on Linux&quot; and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/367034" rel="nofollow">Revision 367034</a></h3>

<blockquote>
<p>Various new check-hash checks have been added to the UFS filesystem<br>
over various major releases. Superblock check hashes were added for<br>
the 12 release and cylinder-group and inode check hashes will appear<br>
in the 13 release.</p>

<hr>

<h3><a href="https://rubenerd.com/openssl-3-written-to-break-on-freebsd/" rel="nofollow">OpenSSL 3.0 /dev/crypto issues on FreeBSD</a></h3>

<p>So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://forums.os108.org/d/32-os108-91-xfce-amd64-released" rel="nofollow">OS108-9.1 XFCE amd64 released</a></h3>

<ul>
<li>OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, <a href="http://www.netbsd.org/docs/guide/en/part-install.html" rel="nofollow">http://www.netbsd.org/docs/guide/en/part-install.html</a></li>
<li><a href="https://youtu.be/cgAeY21gXR4" rel="nofollow">Installation Video</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.openbgpd.org/ftp.html" rel="nofollow">OpenBGPD 6.8p1 portable: released Nov 5th, 2020</a></li>
<li><a href="http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/" rel="nofollow">IRC Awk Bot</a></li>
<li><a href="https://www.youtube.com/watch?v=ZVkJZJEdZNY" rel="nofollow">Docker on FreeBSD using bhyve and sshfs</a></li>
<li><a href="https://github.com/susam/tucl" rel="nofollow">The UNIX Command Language (1976)</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md" rel="nofollow">santi - openrc</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs" rel="nofollow">trond - python2 and mailman</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 270: Ghostly Releases | BSD Now 270</title>
  <link>https://www.bsdnow.tv/270</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2822</guid>
  <pubDate>Thu, 01 Nov 2018 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/83e21562-2f8c-4810-b4c6-0e8f3e36f95b.mp3" length="41653876" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</itunes:subtitle>
  <itunes:duration>1:09:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.
&lt;p&gt;##Headlines&lt;br&gt;
&lt;a href="https://www.openbsd.org/64.html"&gt;OpenBSD 6.4 released&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/plus64.html"&gt;See a detailed log of changes between the 6.3 and 6.4 releases.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/ftp.html"&gt;See the information on the FTP page for a list of mirror machines.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/errata64.html"&gt;Have a look at the 6.4 errata page for a list of bugs and workarounds.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;signify(1) pubkeys for this release:&lt;/li&gt;
&lt;li&gt;base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA&lt;/li&gt;
&lt;li&gt;fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97&lt;/li&gt;
&lt;li&gt;pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://www.ghostbsd.org/18.10_RC2_release_announcement"&gt;GhostBSD 18.10 RC2 Announced&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;What has changed since RC1&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Issues that got fixed&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #70 Cannot run Octopi, missing libgksu error.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Bug #72 libarchive is a missing dependency&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Updating from RC1 to RC2:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg update -f&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg install -f libarchive curl libgksu&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;sudo pkg upgrade&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Where to download:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;All images checksum, hybrid ISO(DVD, USB) and torrent are available here: &lt;a href="https://www.ghostbsd.org/download"&gt;https://www.ghostbsd.org/download&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;[ScreenShots]&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png"&gt;https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-2013-22-41.png&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-2013-27-26.png"&gt;https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-20_13-27-26.png&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://www.openssh.com/txt/release-7.9"&gt;OpenSSH 7.9 has been released and it has support for OpenSSL 1.1&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Changes since OpenSSH 7.8
This is primarily a bugfix release.
New Features
ssh(1), sshd(8): allow most port numbers to be specified using
service names from getservbyname(3) (typically /etc/services).
ssh(1): allow the IdentityAgent configuration directive to accept
environment variable names. This supports the use of multiple
agent sockets without needing to use fixed paths.
sshd(8): support signalling sessions via the SSH protocol.
A limited subset of signals is supported and only for login or
command sessions (i.e. not subsystems) that were not subject to
a forced command via authorizedkeys or sshdconfig. bz#1424
ssh(1): support "ssh -Q sig" to list supported signature options.
Also "ssh -Q help" to show the full set of supported queries.
ssh(1), sshd(8): add a CASignatureAlgorithms option for the
client and server configs to allow control over which signature
formats are allowed for CAs to sign certificates. For example,
this allows banning CAs that sign certificates using the RSA-SHA1
signature algorithm.
sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
revoke keys specified by SHA256 hash.
ssh-keygen(1): allow creation of key revocation lists directly
from base64-encoded SHA256 fingerprints. This supports revoking
keys using only the information contained in sshd(8)
authentication log messages.
Bugfixes
ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when
attempting to load PEM private keys while using an incorrect
passphrase. bz#2901
sshd(8): when a channel closed message is received from a client,
close the stderr file descriptor at the same time stdout is
closed. This avoids stuck processes if they were waiting for
stderr to close and were insensitive to stdin/out closing. bz#2863
ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
forwarding timeout and support X11 forwarding indefinitely.
Previously the behaviour of ForwardX11Timeout=0 was undefined.
sshd(8): when compiled with GSSAPI support, cache supported method
OIDs regardless of whether GSSAPI authentication is enabled in the
main section of sshd_config. This avoids sandbox violations if
GSSAPI authentication was later enabled in a Match block. bz#2107
sshd(8): do not fail closed when configured with a text key
revocation list that contains a too-short key. bz#2897
ssh(1): treat connections with ProxyJump specified the same as
ones with a ProxyCommand set with regards to hostname
canonicalisation (i.e. don't try to canonicalise the hostname
unless CanonicalizeHostname is set to 'always'). bz#2896
ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
key authentication using certificates hosted in a ssh-agent(1)
or against sshd(8) from OpenSSH &amp;lt;7.8.
Portability
All: support building against the openssl-1.1 API (releases 1.1.0g
and later). The openssl-1.0 API will remain supported at least
until OpenSSL terminates security patch support for that API version.
sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
apparently required by some glibc/OpenSSL combinations.
sshd(8): handle getgrouplist(3) returning more than
SCNGROUPSMAX groups. Some platforms consider this limit more
as a guideline.
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;/p&gt;
&lt;p&gt;###&lt;a href="https://www.ixsystems.com/blog/meetbsd-2018/"&gt;MeetBSD 2018: The Ultimate Hallway Track&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 0&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 1&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp;amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;MeetBSD Day 2&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Putting the “meet” in MeetBSD&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;See you at MeetBSD 2020!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/"&gt;Setup DragonflyBSD with a desktop on real hardware ThinkPad T410&lt;/a&gt;&lt;br&gt;
+&lt;a href="https://youtu.be/p4KwssNY82Q"&gt;Video Demo&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.&lt;br&gt;
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!&lt;br&gt;
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Download image file and burn to USB drive or DVD&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;First installation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Setting up the system and installing a desktop&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Inside the desktop&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install some more programs&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How to enable sound?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Let’s play some free games&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Setup WiFi&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Power mode settings&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;More to do?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;A small summary of what we got on the upside:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Free and open source operating system with a long history&lt;/li&gt;
&lt;li&gt;Drivers worked fine including Ethernet, WiFi, video 2D &amp;amp; 3D, audio, etc&lt;/li&gt;
&lt;li&gt;Hammer2 advanced file system&lt;/li&gt;
&lt;li&gt;You are very unique if you use this OS fork&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Some downsides:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Less driver and direct app support than Linux&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Installer and desktop have some traps and quirks and require work&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html"&gt;Porting Keybase to NetBSD&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!&lt;br&gt;
So, this evening, I tried to get it to all work on NetBSD.&lt;br&gt;
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.&lt;br&gt;
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…&lt;br&gt;
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a&lt;br&gt;
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000//api/1.0/merkle/path.json?last=3784314&amp;amp;loaddeleted=1&amp;amp;loadresetchain=1&amp;amp;poll=10&amp;amp;sighints_low=3&amp;amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;There’s a few things about this error message that stuck out to me:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Forking a background server? What?&lt;/li&gt;
&lt;li&gt;It’s trying to connect to localhost? That must be the server that doesn’t work …&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ps 12932
PID TTY STAT    TIME COMMAND
12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
/home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
/home/charlotte/.config/keybase.devel --auto-forked 
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
--standalone                         Use the client without any daemon support.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at &lt;a href="https://keybase.io"&gt;https://keybase.io&lt;/a&gt;?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
--server, -s                         Specify server API.
&lt;/code&gt;&lt;/pre&gt;
&lt;blockquote&gt;
&lt;p&gt;Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:&lt;/p&gt;
&lt;/blockquote&gt;
&lt;pre&gt;&lt;code&gt;charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 
charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ "dressupgeekout" on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ "dressupgeekout" on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/mykeybaseproof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
&lt;/code&gt;&lt;/pre&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=339929"&gt;Initial implementation of draft-ietf-6man-ipv6only-flag&lt;/a&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;This change defines the RA "6" (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.
If all routers agree that it is an IPv6-only link, etheroutputframe(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.
The change also updates ndp to show the "6" flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.
Further changes to tcpdump (contrib code) are availble and will
be upstreamed.
Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the "6" flag set but not understood).
We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.
All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.
Dear 6man, you have running code.
Discussed with: Bob Hinden, Brian E Carpenter
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/"&gt;Running FreeBSD on macOS via xhyve&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3841"&gt;Auction Winners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md"&gt;OpenSSH Principals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20181018160645"&gt;OpenBSD Foundation gets a second Iridium donation from Handshake&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html"&gt;NetBSD machines at Open Source Conference 2018 Kagawa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3818"&gt;Absolute FreeBSD now shipping!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd"&gt;NextCloud on OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/news/newsflash.html#event20181027:01"&gt;FreeBSD 12.0-BETA2 Available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/gvnn3/status/1049347862541344771"&gt;DTrace on Windows ported from FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/36DFQ1S"&gt;HELBUG fall 2018 meeting scheduled - Thursday the 15th of November&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://translate.google.com/translate?hl=de&amp;amp;sl=de&amp;amp;tl=en&amp;amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F"&gt;35C3 pre-sale has started&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/"&gt;Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsd-pl.org/en"&gt;Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Greg - &lt;a href="http://dpaste.com/1WA54CC"&gt;Interview suggestion for the show&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Nelson - &lt;a href="http://dpaste.com/21KKF7Q#wrap"&gt;Ghostscript vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Allison - &lt;a href="http://dpaste.com/3K6D7ST"&gt;Ports and GCC&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview,ghostbsd,keybase,openssh,openssl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</p>

<p>##Headlines<br>
###<a href="https://www.openbsd.org/64.html">OpenBSD 6.4 released</a></p>

<ul>
<li><a href="https://www.openbsd.org/plus64.html">See a detailed log of changes between the 6.3 and 6.4 releases.</a></li>
<li><a href="https://www.openbsd.org/ftp.html">See the information on the FTP page for a list of mirror machines.</a></li>
<li><a href="https://www.openbsd.org/errata64.html">Have a look at the 6.4 errata page for a list of bugs and workarounds.</a></li>
<li>signify(1) pubkeys for this release:</li>
<li>base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA</li>
<li>fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97</li>
<li>pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.ghostbsd.org/18.10_RC2_release_announcement">GhostBSD 18.10 RC2 Announced</a></p>

<blockquote>
<p>This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.</p>
</blockquote>

<ul>
<li>
<p>What has changed since RC1</p>
</li>
<li>
<p>Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod</p>
</li>
<li>
<p>Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel</p>
</li>
<li>
<p>Issues that got fixed</p>
</li>
<li>
<p>Bug #70 Cannot run Octopi, missing libgksu error.</p>
</li>
<li>
<p>Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4</p>
</li>
<li>
<p>Bug #72 libarchive is a missing dependency</p>
</li>
</ul>

<blockquote>
<p>Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.</p>
</blockquote>

<ul>
<li>
<p>Updating from RC1 to RC2:</p>
</li>
<li>
<p>sudo pkg update -f</p>
</li>
<li>
<p>sudo pkg install -f libarchive curl libgksu</p>
</li>
<li>
<p>sudo pkg upgrade</p>
</li>
<li>
<p>Where to download:</p>
</li>
<li>
<p>All images checksum, hybrid ISO(DVD, USB) and torrent are available here: <a href="https://www.ghostbsd.org/download">https://www.ghostbsd.org/download</a></p>
</li>
<li>
<p>[ScreenShots]</p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png</a></p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png</a></p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.openssh.com/txt/release-7.9">OpenSSH 7.9 has been released and it has support for OpenSSL 1.1</a></p>

<pre><code>Changes since OpenSSH 7.8
=========================

This is primarily a bugfix release.

New Features
------------
 * ssh(1), sshd(8): allow most port numbers to be specified using
   service names from getservbyname(3) (typically /etc/services).
 * ssh(1): allow the IdentityAgent configuration directive to accept
   environment variable names. This supports the use of multiple
   agent sockets without needing to use fixed paths.
 * sshd(8): support signalling sessions via the SSH protocol.
   A limited subset of signals is supported and only for login or
   command sessions (i.e. not subsystems) that were not subject to
   a forced command via authorized_keys or sshd_config. bz#1424
 * ssh(1): support &quot;ssh -Q sig&quot; to list supported signature options.
   Also &quot;ssh -Q help&quot; to show the full set of supported queries.
 * ssh(1), sshd(8): add a CASignatureAlgorithms option for the
   client and server configs to allow control over which signature
   formats are allowed for CAs to sign certificates. For example,
   this allows banning CAs that sign certificates using the RSA-SHA1
   signature algorithm.
 * sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
   revoke keys specified by SHA256 hash.
 * ssh-keygen(1): allow creation of key revocation lists directly
   from base64-encoded SHA256 fingerprints. This supports revoking
   keys using only the information contained in sshd(8)
   authentication log messages.

Bugfixes
--------

 * ssh(1), ssh-keygen(1): avoid spurious &quot;invalid format&quot; errors when
   attempting to load PEM private keys while using an incorrect
   passphrase. bz#2901
 * sshd(8): when a channel closed message is received from a client,
   close the stderr file descriptor at the same time stdout is
   closed. This avoids stuck processes if they were waiting for
   stderr to close and were insensitive to stdin/out closing. bz#2863
 * ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
   forwarding timeout and support X11 forwarding indefinitely.
   Previously the behaviour of ForwardX11Timeout=0 was undefined.
 * sshd(8): when compiled with GSSAPI support, cache supported method
   OIDs regardless of whether GSSAPI authentication is enabled in the
   main section of sshd_config. This avoids sandbox violations if
   GSSAPI authentication was later enabled in a Match block. bz#2107
 * sshd(8): do not fail closed when configured with a text key
   revocation list that contains a too-short key. bz#2897
 * ssh(1): treat connections with ProxyJump specified the same as
   ones with a ProxyCommand set with regards to hostname
   canonicalisation (i.e. don't try to canonicalise the hostname
   unless CanonicalizeHostname is set to 'always'). bz#2896
 * ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
   key authentication using certificates hosted in a ssh-agent(1)
   or against sshd(8) from OpenSSH &lt;7.8.

Portability
-----------

 * All: support building against the openssl-1.1 API (releases 1.1.0g
   and later). The openssl-1.0 API will remain supported at least
   until OpenSSL terminates security patch support for that API version.
 * sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
   apparently required by some glibc/OpenSSL combinations.
 * sshd(8): handle getgrouplist(3) returning more than
   _SC_NGROUPS_MAX groups. Some platforms consider this limit more
   as a guideline.
</code></pre>

<p><hr></p>

<p>##News Roundup</p>

<p>###<a href="https://www.ixsystems.com/blog/meetbsd-2018/">MeetBSD 2018: The Ultimate Hallway Track</a></p>

<blockquote>
<p>Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.</p>
</blockquote>

<ul>
<li>MeetBSD Day 0</li>
</ul>

<blockquote>
<p>Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.</p>
</blockquote>

<ul>
<li>MeetBSD Day 1</li>
</ul>

<blockquote>
<p>The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.</p>
</blockquote>

<ul>
<li>MeetBSD Day 2</li>
</ul>

<blockquote>
<p>Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.</p>
</blockquote>

<ul>
<li>Putting the “meet” in MeetBSD</li>
</ul>

<blockquote>
<p>I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.</p>
</blockquote>

<blockquote>
<p>See you at MeetBSD 2020!</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/">Setup DragonflyBSD with a desktop on real hardware ThinkPad T410</a><br>
+<a href="https://youtu.be/p4KwssNY82Q">Video Demo</a></p>

<blockquote>
<p>Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.<br>
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!<br>
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.</p>
</blockquote>

<ul>
<li>
<p>Download image file and burn to USB drive or DVD</p>
</li>
<li>
<p>First installation</p>
</li>
<li>
<p>Setting up the system and installing a desktop</p>
</li>
<li>
<p>Inside the desktop</p>
</li>
<li>
<p>Install some more programs</p>
</li>
<li>
<p>How to enable sound?</p>
</li>
<li>
<p>Let’s play some free games</p>
</li>
<li>
<p>Setup WiFi</p>
</li>
<li>
<p>Power mode settings</p>
</li>
<li>
<p>More to do?</p>
</li>
</ul>

<blockquote>
<p>You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.</p>
</blockquote>

<ul>
<li>
<p>A small summary of what we got on the upside:</p>
<ul>
<li>Free and open source operating system with a long history</li>
<li>Drivers worked fine including Ethernet, WiFi, video 2D &amp; 3D, audio, etc</li>
<li>Hammer2 advanced file system</li>
<li>You are very unique if you use this OS fork</li>
</ul>

<p></li><br>
<li></p>

<p>Some downsides:</p>

<p></li><br>
<li></p>

<p>Less driver and direct app support than Linux</p>

<p></li><br>
<li></p>

<p>Installer and desktop have some traps and quirks and require work</p>

<p></li><br>
</ul><br>
<hr></p>

<p>###<a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html">Porting Keybase to NetBSD</a></p>

<blockquote>
<p>Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!<br>
So, this evening, I tried to get it to all work on NetBSD.<br>
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.<br>
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…<br>
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a<br>
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000/_/api/1.0/merkle/path.json?last=3784314&amp;load_deleted=1&amp;load_reset_chain=1&amp;poll=10&amp;sig_hints_low=3&amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
</code></pre>

<blockquote>
<p>There’s a few things about this error message that stuck out to me:</p>
</blockquote>

<ul>
<li>Forking a background server? What?</li>
<li>It’s trying to connect to localhost? That must be the server that doesn’t work …</li>
</ul>

<blockquote>
<p>Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ps 12932
  PID TTY STAT    TIME COMMAND
  12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
  /home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
  /home/charlotte/.config/keybase.devel --auto-forked 
</code></pre>

<blockquote>
<p>I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
   --standalone                         Use the client without any daemon support.
</code></pre>

<blockquote>
<p>And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at <a href="https://keybase.io">https://keybase.io</a>?</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
   --server, -s                         Specify server API.
</code></pre>

<blockquote>
<p>Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 

charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ &quot;dressupgeekout&quot; on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ &quot;dressupgeekout&quot; on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/my_keybase_proof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
</code></pre>

<p><hr></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=339929">Initial implementation of draft-ietf-6man-ipv6only-flag</a></p>

<pre><code>This change defines the RA &quot;6&quot; (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.

If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.

The change also updates ndp to show the &quot;6&quot; flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.

Further changes to tcpdump (contrib code) are availble and will
be upstreamed.

Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the &quot;6&quot; flag set but not understood).

We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.

All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.

Dear 6man, you have running code.

Discussed with: Bob Hinden, Brian E Carpenter
</code></pre>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/">Running FreeBSD on macOS via xhyve</a></li>
<li><a href="https://mwl.io/archives/3841">Auction Winners</a></li>
<li><a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md">OpenSSH Principals</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181018160645">OpenBSD Foundation gets a second Iridium donation from Handshake</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html">NetBSD machines at Open Source Conference 2018 Kagawa</a></li>
<li><a href="https://mwl.io/archives/3818">Absolute FreeBSD now shipping!</a></li>
<li><a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd">NextCloud on OpenBSD</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20181027:01">FreeBSD 12.0-BETA2 Available</a></li>
<li><a href="https://twitter.com/gvnn3/status/1049347862541344771">DTrace on Windows ported from FreeBSD</a></li>
<li><a href="http://dpaste.com/36DFQ1S">HELBUG fall 2018 meeting scheduled - Thursday the 15th of November</a></li>
<li><a href="https://translate.google.com/translate?hl=de&amp;sl=de&amp;tl=en&amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F">35C3 pre-sale has started</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  </a></li>
<li><a href="https://bsd-pl.org/en">Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 </a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Greg - <a href="http://dpaste.com/1WA54CC">Interview suggestion for the show</a></li>
<li>Nelson - <a href="http://dpaste.com/21KKF7Q#wrap">Ghostscript vulnerabilities</a></li>
<li>Allison - <a href="http://dpaste.com/3K6D7ST">Ports and GCC</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD.</p>

<p>##Headlines<br>
###<a href="https://www.openbsd.org/64.html">OpenBSD 6.4 released</a></p>

<ul>
<li><a href="https://www.openbsd.org/plus64.html">See a detailed log of changes between the 6.3 and 6.4 releases.</a></li>
<li><a href="https://www.openbsd.org/ftp.html">See the information on the FTP page for a list of mirror machines.</a></li>
<li><a href="https://www.openbsd.org/errata64.html">Have a look at the 6.4 errata page for a list of bugs and workarounds.</a></li>
<li>signify(1) pubkeys for this release:</li>
<li>base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA</li>
<li>fw:   RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97</li>
<li>pkg:  RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.ghostbsd.org/18.10_RC2_release_announcement">GhostBSD 18.10 RC2 Announced</a></p>

<blockquote>
<p>This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet.</p>
</blockquote>

<ul>
<li>
<p>What has changed since RC1</p>
</li>
<li>
<p>Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod</p>
</li>
<li>
<p>Douglas Joachin added libva-intel-driver libva-vdpau-driver  to supports accelerated some video driver for Intel</p>
</li>
<li>
<p>Issues that got fixed</p>
</li>
<li>
<p>Bug #70 Cannot run Octopi, missing libgksu error.</p>
</li>
<li>
<p>Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4</p>
</li>
<li>
<p>Bug #72 libarchive is a missing dependency</p>
</li>
</ul>

<blockquote>
<p>Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother.</p>
</blockquote>

<ul>
<li>
<p>Updating from RC1 to RC2:</p>
</li>
<li>
<p>sudo pkg update -f</p>
</li>
<li>
<p>sudo pkg install -f libarchive curl libgksu</p>
</li>
<li>
<p>sudo pkg upgrade</p>
</li>
<li>
<p>Where to download:</p>
</li>
<li>
<p>All images checksum, hybrid ISO(DVD, USB) and torrent are available here: <a href="https://www.ghostbsd.org/download">https://www.ghostbsd.org/download</a></p>
</li>
<li>
<p>[ScreenShots]</p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-22-41.png</a></p>
</li>
<li>
<p><a href="https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png">https://www.ghostbsd.org/sites/default/files/Screenshot_at_2018-10-20_13-27-26.png</a></p>
</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.openssh.com/txt/release-7.9">OpenSSH 7.9 has been released and it has support for OpenSSL 1.1</a></p>

<pre><code>Changes since OpenSSH 7.8
=========================

This is primarily a bugfix release.

New Features
------------
 * ssh(1), sshd(8): allow most port numbers to be specified using
   service names from getservbyname(3) (typically /etc/services).
 * ssh(1): allow the IdentityAgent configuration directive to accept
   environment variable names. This supports the use of multiple
   agent sockets without needing to use fixed paths.
 * sshd(8): support signalling sessions via the SSH protocol.
   A limited subset of signals is supported and only for login or
   command sessions (i.e. not subsystems) that were not subject to
   a forced command via authorized_keys or sshd_config. bz#1424
 * ssh(1): support &quot;ssh -Q sig&quot; to list supported signature options.
   Also &quot;ssh -Q help&quot; to show the full set of supported queries.
 * ssh(1), sshd(8): add a CASignatureAlgorithms option for the
   client and server configs to allow control over which signature
   formats are allowed for CAs to sign certificates. For example,
   this allows banning CAs that sign certificates using the RSA-SHA1
   signature algorithm.
 * sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
   revoke keys specified by SHA256 hash.
 * ssh-keygen(1): allow creation of key revocation lists directly
   from base64-encoded SHA256 fingerprints. This supports revoking
   keys using only the information contained in sshd(8)
   authentication log messages.

Bugfixes
--------

 * ssh(1), ssh-keygen(1): avoid spurious &quot;invalid format&quot; errors when
   attempting to load PEM private keys while using an incorrect
   passphrase. bz#2901
 * sshd(8): when a channel closed message is received from a client,
   close the stderr file descriptor at the same time stdout is
   closed. This avoids stuck processes if they were waiting for
   stderr to close and were insensitive to stdin/out closing. bz#2863
 * ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
   forwarding timeout and support X11 forwarding indefinitely.
   Previously the behaviour of ForwardX11Timeout=0 was undefined.
 * sshd(8): when compiled with GSSAPI support, cache supported method
   OIDs regardless of whether GSSAPI authentication is enabled in the
   main section of sshd_config. This avoids sandbox violations if
   GSSAPI authentication was later enabled in a Match block. bz#2107
 * sshd(8): do not fail closed when configured with a text key
   revocation list that contains a too-short key. bz#2897
 * ssh(1): treat connections with ProxyJump specified the same as
   ones with a ProxyCommand set with regards to hostname
   canonicalisation (i.e. don't try to canonicalise the hostname
   unless CanonicalizeHostname is set to 'always'). bz#2896
 * ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
   key authentication using certificates hosted in a ssh-agent(1)
   or against sshd(8) from OpenSSH &lt;7.8.

Portability
-----------

 * All: support building against the openssl-1.1 API (releases 1.1.0g
   and later). The openssl-1.0 API will remain supported at least
   until OpenSSL terminates security patch support for that API version.
 * sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
   apparently required by some glibc/OpenSSL combinations.
 * sshd(8): handle getgrouplist(3) returning more than
   _SC_NGROUPS_MAX groups. Some platforms consider this limit more
   as a guideline.
</code></pre>

<p><hr></p>

<p>##News Roundup</p>

<p>###<a href="https://www.ixsystems.com/blog/meetbsd-2018/">MeetBSD 2018: The Ultimate Hallway Track</a></p>

<blockquote>
<p>Founded in Poland in 2007 and first hosted in California in 2008, MeetBSD combines formal talks with UnConference activities to provide a level of interactivity not found at any other BSD conference. The character of each MeetBSD is determined largely by its venue, ranging from Hacker Dojo in 2010 to Intel’s Santa Clara headquarters this year. The Intel SC12 building provided a beautiful auditorium and sponsors’ room, plus a cafeteria for the Friday night social event and the Saturday night FreeBSD 25th Anniversary Celebration. The formal nature of the auditorium motivated the formation of MeetBSD’s first independent Program Committee and public Call for Participation. Together these resulted in a backbone of talks presented by speakers from the USA, Canada, and Poland, combined with UnConference activities tailored to the space.</p>
</blockquote>

<ul>
<li>MeetBSD Day 0</li>
</ul>

<blockquote>
<p>Day Zero of MeetBSD was a FreeBSD Developer/Vendor Summit hosted in the same auditorium where the talks would take place. Like the conference itself, this event featured a mix of scheduled talks and interactive sessions. The scheduled talks were LWPMFS: LightWeight Persistent Memory Filesystem by Ravi Pokala, Evaluating GIT for FreeBSD by Ed Maste, and NUMA by Mark Johnston. Ed’s overview of the advantages and disadvantages of using Git for FreeBSD development was of the most interest to users and developers, and the discussion continued into the following two days.</p>
</blockquote>

<ul>
<li>MeetBSD Day 1</li>
</ul>

<blockquote>
<p>The first official day of MeetBSD 2018 was kicked off with introductions led by emcee JT Pennington and a keynote, “Using TrueOS to boot-strap your FreeBSD-based project” by Kris Moore. Kris described a new JSON-based release infrastructure that he has exercised with FreeBSD, TrueOS, and FreeNAS. Kris’ talk was followed by “Intel &amp; FreeBSD: Better Together” by Ben Widawsky, the FreeBSD program lead at Intel, who gave an overview of Intel’s past and current efforts supporting FreeBSD. Next came lunch, followed by Kamil Rytarowski’s “Bug detecting software in the NetBSD userland: MKSANITIZER”. This was followed by 5-Minute Lightning Talks, Andrew Fengler’s “FreeBSD: What to (Not) Monitor”, and an OpenZFS Panel Discussion featuring OpenZFS experts Michael W. Lucas, Allan Jude, Alexander Motin, Pawel Dawidek, and Dan Langille. Day one concluded with a social event at the Intel cafeteria where the discussions continued into the night.</p>
</blockquote>

<ul>
<li>MeetBSD Day 2</li>
</ul>

<blockquote>
<p>Day Two of MeetBSD 2018 kicked off with a keynote by Michael W. Lucas entitled “Why BSD?”, where Michael detailed what makes the BSD community different and why it attracts us all. This was followed by Dr. Kirk McKusick’s “The Early Days of BSD” talk, which was followed by “DTrace/dwatch in Production” by Devin Teske. After lunch, we enjoyed “A Curmudgeon’s Language Selection Criteria: Why I Don’t Write Everything in Go, Rust, Elixir, etc” by G. Clifford Williams and, “Best practices of sandboxing applications with Capsicum” by Mariusz Zaborski. I then hosted a Virtualization Panel Discussion that featured eight developers from FreeBSD, OpenBSD, and NetBSD. We then split up for Breakout Sessions and the one on Bloomberg’s controversial article on backdoored Supermicro systems was fascinating given the experts present, all of whom were skeptical of the feasibility of the attack. The day wrapped up with a final talk, “Tales of a Daemontown Performance Peddler: Why ‘it depends’ and what you can do about it” by Nick Principe, followed by the FreeBSD 25th Anniversary Celebration.</p>
</blockquote>

<ul>
<li>Putting the “meet” in MeetBSD</li>
</ul>

<blockquote>
<p>I confess the other organizers and I were nervous about how well one large auditorium would suit a BSD event but the flexible personal space it gave everyone allowed for countless meetings and heated hacking that often brought about immediate results. I watched people take ideas through several iterations with the help and input of obvious and unexpected experts, all of whom were within reach. Not having to pick up and leave for a talk in another room organically resulted in essentially a series of mini hackathons that none of us anticipated but were delighted to witness, taking the “hallway track” to a whole new level. The mix of formal and UnConference activities at MeetBSD is certain to evolve. Thank you to everyone who participated with questions, Lightning Talks, and Panel participation. A huge thanks to our sponsors, including Intel for both hosting and sponsoring MeetBSD California 2018, Western Digital, Supermicro, Verisign, Jupiter Broadcasting, the FreeBSD Foundation, Bank of America Merrill Lynch, the NetBSD Foundation, and the team at iXsystems.</p>
</blockquote>

<blockquote>
<p>See you at MeetBSD 2020!</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://panoramacircle.com/2018/10/07/setup-dragonflybsd-with-a-desktop-on-real-hardware-thinkpad-t410/">Setup DragonflyBSD with a desktop on real hardware ThinkPad T410</a><br>
+<a href="https://youtu.be/p4KwssNY82Q">Video Demo</a></p>

<blockquote>
<p>Linux has become too mainstream and standard BSD is a common thing now? How about DragonflyBSD which was created as a fork of FreeBSD 4.8 in conflict over system internals. This tutorial will show how to install it and set up a user-oriented desktop. It should work with DragonflyBSD, FreeBSD and probably all BSDs.<br>
Some background: BSD was is ultimately derived from UNIX back in the days. It is not Linux even though it is similar in many ways because Linux was designed to follow UNIX principles. Seeing is believing, so check out the video of the install!<br>
I did try two BSD distros before called GhostBSD and TrueOS and you can check out my short reviews. DragonflyBSD comes like FreeBSD bare bones and requires some work to get a desktop running.</p>
</blockquote>

<ul>
<li>
<p>Download image file and burn to USB drive or DVD</p>
</li>
<li>
<p>First installation</p>
</li>
<li>
<p>Setting up the system and installing a desktop</p>
</li>
<li>
<p>Inside the desktop</p>
</li>
<li>
<p>Install some more programs</p>
</li>
<li>
<p>How to enable sound?</p>
</li>
<li>
<p>Let’s play some free games</p>
</li>
<li>
<p>Setup WiFi</p>
</li>
<li>
<p>Power mode settings</p>
</li>
<li>
<p>More to do?</p>
</li>
</ul>

<blockquote>
<p>You can check out this blog post if you want a much more detailed tutorial. If you don’t mind standard BSD, get the GhostBSD distro instead which comes with a ready-made desktop xcfe or mate and many functional presets.</p>
</blockquote>

<ul>
<li>
<p>A small summary of what we got on the upside:</p>
<ul>
<li>Free and open source operating system with a long history</li>
<li>Drivers worked fine including Ethernet, WiFi, video 2D &amp; 3D, audio, etc</li>
<li>Hammer2 advanced file system</li>
<li>You are very unique if you use this OS fork</li>
</ul>

<p></li><br>
<li></p>

<p>Some downsides:</p>

<p></li><br>
<li></p>

<p>Less driver and direct app support than Linux</p>

<p></li><br>
<li></p>

<p>Installer and desktop have some traps and quirks and require work</p>

<p></li><br>
</ul><br>
<hr></p>

<p>###<a href="https://dressupgeekout.blogspot.com/2018/10/porting-keybase-to-netbsd.html">Porting Keybase to NetBSD</a></p>

<blockquote>
<p>Keybase significantly simplifies the whole keypair/PGP thing and makes what is usually a confusing, difficult experience actually rather pleasant. At its heart is an open-source command line utility that does all of the heavy cryptographic lifting. But it’s also hooked up to the network of all other Keybase users, so you don’t have to work very hard to maintain big keychains. Pretty cool!<br>
So, this evening, I tried to get it to all work on NetBSD.<br>
The Keybase client code base is, in my opinion, not very well architected… there exist many different Keybase clients (command line apps, desktop apps, mobile apps) and for some reason the code for all of them are seemingly in this single repository, without even using Git submodules. Not sure what that’s about.<br>
Anyway, “go build”-ing the command line program (it’s written in Go) failed immediately because there’s some platform-specific code that just does not seem to recognize that NetBSD exists (but they do for FreeBSD and OpenBSD). Looks like the Keybase developers maintain a Golang wrapper around struct proc, which of course is different from OS to OS. So I literally just copypasted the OpenBSD wrapper, renamed it to “NetBSD”, and the build basically succeeded from there! This is of course super janky and untrustworthy, but it seems to Mostly Just Work…<br>
I forked the GitHub repo, you can see the diff on top of keybase 2.7.3 here: bccaaf3096a<br>
Eventually I ended up with a ~/go/bin/keybase which launches just fine. Meaning, I can main() okay. But the moment you try to do anything interesting, it looks super scary:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase login
▶ WARNING Running in devel mode
▶ INFO Forking background server with pid=12932
▶ ERROR unexpected error in Login: API network error: doRetry failed,
attempts: 1, timeout 5s, last err: Get
http://localhost:3000/_/api/1.0/merkle/path.json?last=3784314&amp;load_deleted=1&amp;load_reset_chain=1&amp;poll=10&amp;sig_hints_low=3&amp;uid=38ae1dfa49cd6831ea2fdade5c5d0519:
dial tcp [::1]:3000: connect: connection refused
</code></pre>

<blockquote>
<p>There’s a few things about this error message that stuck out to me:</p>
</blockquote>

<ul>
<li>Forking a background server? What?</li>
<li>It’s trying to connect to localhost? That must be the server that doesn’t work …</li>
</ul>

<blockquote>
<p>Unfortunately, this nonfunctional “background server” sticks around even when a command as simple as ‘login’ command just failed:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ps 12932
  PID TTY STAT    TIME COMMAND
  12932 ?   Ssl  0:00.21 ./keybase --debug --log-file
  /home/charlotte/.cache/keybase.devel/keybase.service.log service --chdir
  /home/charlotte/.config/keybase.devel --auto-forked 
</code></pre>

<blockquote>
<p>I’m not exactly sure what the intended purpose of the “background server” even is, but fortunately we can kill it and even tell the keybase command to not even spawn one:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --standalone
   --standalone                         Use the client without any daemon support.
</code></pre>

<blockquote>
<p>And then we can fix wanting to connect to localhost by specifying an expected Keybase API server – how about the one hosted at <a href="https://keybase.io">https://keybase.io</a>?</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase help advanced | grep -- --server
   --server, -s                         Specify server API.
</code></pre>

<blockquote>
<p>Basically, what I’m trying to say is that if you specify both of these options, the keybase command does what I expect on NetBSD:</p>
</blockquote>

<pre><code>charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io login
▶ WARNING Running in devel mode
Please enter the Keybase passphrase for dressupgeekout (6+ characters): 

charlotte@sakuracity:~/go/bin ./keybase --standalone -s https://keybase.io id dressupgeekout
▶ WARNING Running in devel mode
▶ INFO Identifying dressupgeekout
✔ public key fingerprint: 7873 DA50 A786 9A3F 1662 3A17 20BD 8739 E82C 7F2F
✔ &quot;dressupgeekout&quot; on github:
https://gist.github.com/0471c7918d254425835bf5e1b4bcda00 [cached 2018-10-11
20:55:21 PDT]
✔ &quot;dressupgeekout&quot; on reddit:
https://www.reddit.com/r/KeybaseProofs/comments/9ng5qm/my_keybase_proof_redditdressupgeekout/
[cached 2018-10-11 20:55:21 PDT]
</code></pre>

<p><hr></p>

<p>###<a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=339929">Initial implementation of draft-ietf-6man-ipv6only-flag</a></p>

<pre><code>This change defines the RA &quot;6&quot; (IPv6-Only) flag which routers
may advertise, kernel logic to check if all routers on a link
have the flag set and accordingly update a per-interface flag.

If all routers agree that it is an IPv6-only link, ether_output_frame(),
based on the interface flag, will filter out all ETHERTYPE_IP/ARP
frames, drop them, and return EAFNOSUPPORT to upper layers.

The change also updates ndp to show the &quot;6&quot; flag, ifconfig to
display the IPV6_ONLY nd6 flag if set, and rtadvd to allow
announcing the flag.

Further changes to tcpdump (contrib code) are availble and will
be upstreamed.

Tested the code (slightly earlier version) with 2 FreeBSD
IPv6 routers, a FreeBSD laptop on ethernet as well as wifi,
and with Win10 and OSX clients (which did not fall over with
the &quot;6&quot; flag set but not understood).

We may also want to (a) implement and RX filter, and (b) over
time enahnce user space to, say, stop dhclient from running
when the interface flag is set.  Also we might want to start
IPv6 before IPv4 in the future.

All the code is hidden under the EXPERIMENTAL option and not
compiled by default as the draft is a work-in-progress and
we cannot rely on the fact that IANA will assign the bits
as requested by the draft and hence they may change.

Dear 6man, you have running code.

Discussed with: Bob Hinden, Brian E Carpenter
</code></pre>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://dan.langille.org/2018/10/02/running-freebsd-on-osx-using-xhyve-a-port-of-bhyve/">Running FreeBSD on macOS via xhyve</a></li>
<li><a href="https://mwl.io/archives/3841">Auction Winners</a></li>
<li><a href="https://github.com/vedetta-com/vedetta/blob/master/src/usr/local/share/doc/vedetta/OpenSSH_Principals.md">OpenSSH Principals</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20181018160645">OpenBSD Foundation gets a second Iridium donation from Handshake</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/10/10/msg000786.html">NetBSD machines at Open Source Conference 2018 Kagawa</a></li>
<li><a href="https://mwl.io/archives/3818">Absolute FreeBSD now shipping!</a></li>
<li><a href="https://h3artbl33d.nl/blog/nextcloud-on-openbsd">NextCloud on OpenBSD</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20181027:01">FreeBSD 12.0-BETA2 Available</a></li>
<li><a href="https://twitter.com/gvnn3/status/1049347862541344771">DTrace on Windows ported from FreeBSD</a></li>
<li><a href="http://dpaste.com/36DFQ1S">HELBUG fall 2018 meeting scheduled - Thursday the 15th of November</a></li>
<li><a href="https://translate.google.com/translate?hl=de&amp;sl=de&amp;tl=en&amp;u=https%3A%2F%2Ftickets.events.ccc.de%2F35c3%2Fintro%2F">35C3 pre-sale has started</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/254235663/">Stockholm BSD User Meeting: Tuesday Nov 13, 18:00 - 21:30  </a></li>
<li><a href="https://bsd-pl.org/en">Polish BSD User Group: Thursday Nov 15, 18:30 - 21:00 </a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Greg - <a href="http://dpaste.com/1WA54CC">Interview suggestion for the show</a></li>
<li>Nelson - <a href="http://dpaste.com/21KKF7Q#wrap">Ghostscript vulnerabilities</a></li>
<li>Allison - <a href="http://dpaste.com/3K6D7ST">Ports and GCC</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>104: Beverly Hills 25519</title>
  <link>https://www.bsdnow.tv/104</link>
  <guid isPermaLink="false">0bc0c068-36fe-429f-b7f4-38ac01fb7f19</guid>
  <pubDate>Wed, 26 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0bc0c068-36fe-429f-b7f4-38ac01fb7f19.mp3" length="58136116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</itunes:subtitle>
  <itunes:duration>1:20:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
EdgeRouter Lite, meet OpenBSD (http://www.tedunangst.com/flak/post/OpenBSD-on-ERL)
The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it 
We've covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)
Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it
He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware
More discussion can be found on Hacker News (https://news.ycombinator.com/item?id=10079210) and various (https://www.reddit.com/r/openbsd/comments/3hgf2c) other (https://www.marc.info/?t=143974140500001&amp;amp;r=1&amp;amp;w=2) places (https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite)
One thing to note (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143991822827285&amp;amp;w=2) about these devices: because of their MIPS64 processor, they'll have weaker ASLR than X86 CPUs (and no W^X at all)
***
Design and Implementation of the FreeBSD Operating System interview (http://www.infoq.com/articles/freebsd-design-implementation-review)
For those who don't know, the "Design and Implementation of the FreeBSD Operating System" is a semi-recently-revived technical reference book for FreeBSD development
InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors
"The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points."
Aside from detailing a few of the chapters, the interview covers who the book's target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***
Path list parameter in OpenBSD tame (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144027474117290&amp;amp;w=2)
We've mentioned OpenBSD's relatively new "tame (https://marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2)" subsystem a couple times before: it's an easy-to-implement "self-containment" framework, allowing programs to have a reduced feature set mode with even less privileges
One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between
Now there's the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers
The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9
More discussion can be found on Reddit (https://www.reddit.com/r/openbsd/comments/3i2lk7) and Hacker News (https://news.ycombinator.com/item?id=10104886)
***
FreeBSD &amp;amp; PC-BSD 10.2-RELEASE (https://www.freebsd.org/releases/10.2R/announce.html)
The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out
The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13
New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to
A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet
The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions
ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards
The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups
In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail
Check the full release notes (https://www.freebsd.org/releases/10.2R/relnotes.html) for the rest of the details and changes
PC-BSD also followed with their 10.2-RELEASE (http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available), sporting a few more additional features
***
Interview - Damien Miller - djm@openbsd.org (mailto:djm@openbsd.org) / @damienmiller (https://twitter.com/damienmiller)
OpenSSH: phasing out broken crypto, default cipher changes
News Roundup
NetBSD at Open Source Conference Shimane (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html)
We weren't the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another
This time they had NetBSD running on some Sony NWS devices (MIPS-based)
JavaStations (https://en.wikipedia.org/wiki/JavaStation) were also on display - something we haven't ever seen before (made between 1996-2000)
***
BAFUG videos (https://www.youtube.com/watch?v=-XF20nitI90)
The Bay Area FreeBSD users group has been uploading some videos of their recent meetings
Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works
Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts
In a second video (https://www.youtube.com/watch?v=49sPYHh473U), Jordan Hubbard and Kip Macy introduce "NeXTBSD aka FreeBSD X"
In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)
People should record presentations at their BSD users groups and send them to us
***
L2TP over IPSEC on OpenBSD (http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients)
If you've got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well
Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic
This guide specifically covers L2TP, using npppd and pre-shared keys
Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***
Reliable bare metal with TrueOS (http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd)
Imagine a server version of PC-BSD with some useful utilities preinstalled - that's basically TrueOS
This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution
Most importantly, he also covers how to keep everything redundant and deal with hard drives failing
The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he'd like
Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***
Kernel W^X on i386 (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144047868127049&amp;amp;w=2)
We mentioned some big W^X kernel changes in OpenBSD a while back (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2), but the work was mainly for x86_64 CPU architecture (which makes sense; that's what most people run now)
Mike Larkin is back again, and isn't leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well
Check out our interview with Mike (http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction) for some more background info on memory protections like W^X
***
Feedback/Questions
Markus writes in (http://slexy.org/view/s2iGoeYMyb)
Sean writes in (http://slexy.org/view/s21bIFfmUS)
Theo writes in (http://slexy.org/view/s21Hjm8Tsa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssh, openssl, chacha20, chacha20-poly1305, aes, md5, hmac, cbc, gcm, cryptography, ed25519, curve25519, erl, edgerouter lite, tame, bafug</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>82: SSL in the Wild</title>
  <link>https://www.bsdnow.tv/82</link>
  <guid isPermaLink="false">530c2987-381d-4c49-bfb9-b78872dd2e03</guid>
  <pubDate>Wed, 25 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/530c2987-381d-4c49-bfb9-b78872dd2e03.mp3" length="63405364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2015 call for papers (https://2015.eurobsdcon.org/call-for-papers/)
The call for papers has been announced for the next EuroBSDCon (http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur), which is set to be held in Sweden this year
According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April
If giving a full talk isn't your thing, there's also a call for tutorials - if you're comfortable teaching other people about something BSD-related, this could be a great thing too
You're not limited to one proposal - several speakers gave multiple in 2014 - so don't hesitate if you've got more than one thing you'd like to talk about
We'd like to see a more balanced conference schedule than BSDCan's having this year, but that requires effort on both sides - if you're doing anything cool with any BSD, we'd encourage you submit a proposal (or two)
Check the announcement for all the specific details and requirements
If your talk gets accepted, the conference even pays for your travel expenses
***
Making security sausage (http://www.tedunangst.com/flak/post/making-security-sausage)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD
"Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!"
The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review
It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug
Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions
The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them
Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute
It was because of this that FreeBSD actually had to release a security update to their security update (https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html)
He concludes with "My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note 'oh, and some security too' creates downstream mayhem."
***
Running FreeBSD on the server, a sysadmin speaks (http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks)
More BSD content is appearing on mainstream technology sites, and, more importantly, BSD Now is being mentioned
ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)
They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor
It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers
If you've been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***
NetBSD ported to Hardkernel ODROID-C1 (https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid)
In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the Hardkernel ODROID-C1 (http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433)
This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35
There's a special kernel config file for this board's hardware, available in both -current and the upcoming 7.0
More info can be found on their wiki page (https://wiki.netbsd.org/ports/evbarm/odroid-c1/)
After this was written, basic framebuffer console support was also committed (http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html), allowing a developer to run XFCE (https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large) on the device
***
Interview - Bernard Spil - brnrd@freebsd.org (mailto:brnrd@freebsd.org) / @sp1l (https://twitter.com/sp1l)
LibreSSL adoption in FreeBSD ports (https://wiki.freebsd.org/LibreSSL) and the wider software ecosystem
News Roundup
Monitoring pf logs with Gource (http://www.echothrust.com/blogs/monitoring-pf-logs-gource)
If you're using pf (http://www.bsdnow.tv/tutorials/pf) on any of the BSDs, maybe you've gotten bored of grepping logs and want to do something more fancy
This article will show you how to get set up with Gource for a cinematic-like experience
If you've never heard of Gource, it's "an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories"
When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic
One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend's phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***
pkgng 1.5.0 alpha1 released (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=381573)
The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1
This update introduces support for provides/requires, something that we've been wanting for a long time
It will also now print which package is the reason for direct dependency change
Another interesting addition is the "pkg -r" switch, allowing cross installation of packages
Remember this isn't the stable version, so maybe don't upgrade to it just yet on any production systems
DragonFly will also likely pick up this update once it's marked stable
***
Welcome to OpenBSD (http://devio.us/~bcallah/rcos2015.pdf)
We mentioned last week that our listener Brian was giving a talk in the Troy, New York area
The slides from that talk are now online, and they've been generating quite a bit of discussion (https://news.ycombinator.com/item?id=9240533) online (https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/)
It's simply titled "Welcome to OpenBSD" and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)
Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved
As you may know, NetBSD has almost 60 supported platforms (https://www.netbsd.org/ports/) and their slogan is "of course it runs NetBSD" - Brian says, with 17 platforms (http://www.openbsd.org/plat.html) over 13 CPU architectures, "it probably runs OpenBSD"
No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet
Try to guess which font he used...
***
BSDTalk episode 252 (http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html)
And somehow Brian has snuck himself into another news item this week
He makes an appearance in the latest episode of BSD Talk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk), where he chats with Will about running a BSD-based shell provider
If that sounds familiar, it's probably because we did the same thing (http://www.bsdnow.tv/episodes/2014_06_18-devious_methods), albeit with a different member of their team
In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people
They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***
Feedback/Questions
Christian writes in (http://slexy.org/view/s2O81pixhq)
Stefan writes in (http://slexy.org/view/s2dhr2WfVc)
Possnfiffer writes in (http://slexy.org/view/s2Kisq2EqT)
Ruudsch writes in (http://slexy.org/view/s2Xr0e5YAJ)
Shane writes in (http://slexy.org/view/s2Xz7BNoJE)
***
Mailing List Gold
Accidental support (https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html)
Larry's tears (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142686812913221&amp;amp;w=2)
The boy who sailed with BSD (https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgng, poudriere, eurobsdcon, 2015, mg, emacs, libressl, openssl, ports, tls, heartbleed, freak attack, pkgng, hardkernel, gource</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>73: Pipe Dreams</title>
  <link>https://www.bsdnow.tv/73</link>
  <guid isPermaLink="false">bca95163-7c0b-4440-902b-594ea8c61554</guid>
  <pubDate>Wed, 21 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bca95163-7c0b-4440-902b-594ea8c61554.mp3" length="65969428" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-10-2014-12.html)
The FreeBSD team has posted an updated on some of their activities between October and December of 2014
They put a big focus on compatibility with other systems: the Linux emulation layer, bhyve (http://www.bsdnow.tv/tutorials/bhyve), WINE and Xen all got some nice improvements
As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure
The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs
FreeBSD's forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)
Git was promoted from beta to an officially-supported version control system (Kris is happy)
The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints
Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more "cloud" services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements
Check out the full report for all the details that we didn't cover
***
OpenBSD package signature audit (http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/)
"Linux Audit" is a website focused on auditing and hardening systems, as well as educating people about securing their boxes
They recently did an article about OpenBSD, specifically their ports and package system (http://www.bsdnow.tv/tutorials/ports-obsd) and signing infrastructure
The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed
Package signature formats and public key distribution methods are also touched on
After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future
If you haven't seen our episode about signify (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) with Ted Unangst, that would be a great one to check out after reading this
***
Replacing a Linux router with BSD (http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd)
There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one
The poster begins with "I'm in the camp that doesn't trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I'd run Windows NT, not Linux. So I've decided to migrate my homebrew router/firewall/samba server to one of the BSDs."
A lot of people were quick to recommend OPNsense (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) and pfSense, being that they're very easy to administer (requiring basically no BSD knowledge at all)
Other commenters suggested a more hands-on approach, setting one up yourself with FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/) or OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router)
If you've been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through
Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you'll have to wade through some of that to get to the good information
***
LibreSSL in FreeBSD and OPNsense (http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html)
A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)
The reasoning being that updates in base tend to lag behind (http://www.openbsd.org/papers/eurobsdcon2014-libressl.html), whereas the port can be updated for security very quickly
OPNsense developers are looking into (https://twitter.com/fitchitis/status/555625679614521345)  switching away (http://forum.opnsense.org/index.php?topic=21.0) from OpenSSL to LibreSSL's portable version (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl), for both their ports and base system, which would be a pretty huge differentiator for their project
Some ports still need fixing (https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&amp;amp;query_format=advanced&amp;amp;short_desc=libressl&amp;amp;short_desc_type=allwordssubstr) to be compatible though, particularly a few (https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057) python-related (https://github.com/pyca/cryptography/issues/928) ones
If you're a FreeBSD ports person, get involved and help squash some of the last remaining bugs
A lot of the work has already been done in OpenBSD's ports tree (http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/) - some patches just need to be adopted
More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you're using it
***
Interview - David Maxwell - david@netbsd.org (mailto:david@netbsd.org) / @davidwmaxwell (https://twitter.com/david_w_maxwell)
Pipecut (https://www.youtube.com/watch?v=CZHEZHK4jRc), text processing, commandline wizardry
News Roundup
Jetpack, a new jail container system (https://github.com/3ofcoins/jetpack)
A new project was launched to adapt FreeBSD jails to the "app container specification"
While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker
It's a similar project to iocage (https://github.com/pannon/iocage) or bsdploy (https://github.com/ployground/bsdploy), which we haven't talked a whole lot about
There was also some discussion (https://news.ycombinator.com/item?id=8893630) about it on Hacker News
***
Separating base and package binaries (https://www.reddit.com/r/BSD/comments/2szofc)
All of the main BSDs make a strong separation between the base system and third party software
This is in contrast to Linux where there's no real concept of a "base system" - more recently, some distros have even merged all the binaries into a single directory
A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies
Read the comments for the full explanation, but having things separated really helps keep things organized
***
Updated i915kms driver for FreeBSD (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=277487)
This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward
It doesn't introduce Haswell support just yet, but was required before the Haswell bits can be added
***
Year of the OpenBSD desktop (http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/)
Here we have an article about using OpenBSD as a daily driver for regular desktop usage
The author says he "ran fifty thousand different distributions, never being satisfied"
After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook
He also used FreeBSD between versions 7 and 9, finding a "a mostly harmonious environment," but regressions lead him to give up on desktop *nix once again
Starting with 2015, he's back and is using OpenBSD on a Thinkpad x201
The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup
He apparently used our desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd) - thanks for watching!
***
Unattended FreeBSD installation (http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html)
A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE
His goal was to have a setup similar to Redhat's "kickstart" or OpenBSD's autoinstall (http://www.bsdnow.tv/tutorials/autoinstall)
The article shows you how to set up DHCP and TFTP, with no NFS share setup required
He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***
Feedback/Questions
Robert writes in (http://slexy.org/view/s20UsZjN4h)
Sean writes in (http://slexy.org/view/s219cMQz3U)
l33tname writes in (http://slexy.org/view/s2EkzMUMyb)
Charlie writes in (http://slexy.org/view/s2nq6L6H1n)
Eric writes in (http://slexy.org/view/s21EGqUYLd)
***
Mailing List Gold
Clowning around (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142159202606668&amp;amp;w=2)
Better than succeeding in this case (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pipecut, david maxwell, commandline, shell, libressl, router, pf, cryptography, router, openssl, bhyve, digitalocean</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>55: The Promised WLAN</title>
  <link>https://www.bsdnow.tv/55</link>
  <guid isPermaLink="false">138f743e-c056-4292-9d04-7a7022b34944</guid>
  <pubDate>Wed, 17 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/138f743e-c056-4292-9d04-7a7022b34944.mp3" length="57124948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 10.1-BETA1 is out (http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/)
The first maintenance update in the 10.x series of FreeBSD is on its way
Since we can't see a changelog yet, the 10-STABLE release notes (https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html) offer a glimpse at some of the new features and fixes that will be included in 10.1
The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11
Initial UEFI support, multithreaded softupdates for UFS and many more things were added
You can check the release schedule (https://www.freebsd.org/releases/10.1R/schedule.html) for the planned release dates
Details for the various forms of release media can be found in the announcement (https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html)
***
Remote headless OpenBSD installation (https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/)
A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes
Sometimes you'll get lucky and they'll offer FreeBSD, but it's much harder to find ones that natively support other BSDs
This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely
It required a few specific steps you'll want to take note of, but is extremely useful for those pesky hosting providers
***
Building a firewall appliance with pfSense (http://www.get-virtual.net/2014/09/16/build-firewall-appliance/)
In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate ALIX2C3 APU (http://pcengines.ch/alix2c3.htm)
After the author's modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board
The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)
There's a lot of great pictures of the hardware and detailed screenshots, definitely worth a look
***
Receive Side Scaling - UDP testing (http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html)
Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress
He's using some quad core boxes with 10 gigabit ethernet for the tests
The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do
He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)
And speaking of Adrian Chadd...
***
Interview - Adrian Chadd - adrian@freebsd.org (mailto:adrian@freebsd.org) / @erikarn (https://twitter.com/erikarn)
BSD on laptops, wifi, drivers, various topics
News Roundup
Sendmail removed from OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140916084251)
Mail server admins around the world are rejoicing (https://news.ycombinator.com/item?id=8324475), because sendmail is finally gone (http://marc.info/?l=openbsd-cvs&amp;amp;m=141081997917153&amp;amp;w=2) from OpenBSD
With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded
If you've ever compared a "sendmail.cf" file to an "smtpd.conf" file... the different is as clear as night and day
5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it
If you still need it for some reason, sendmail will live in ports from now on
Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly's mail transfer agent in base (instead of an entire mail server)
***
pfSense backups with pfmb (https://github.com/zinkwazi/pfmb)
We've mentioned the need for a tool to back up pfSense configs a number of times on the show
This script, hosted on github, does pretty much exactly that
It can connect to one (or more!) pfSense installations and back up the configuration
You can roll back or replace failed hardware very easily with its restore function
Everything is done over SSH, so it should be pretty secure
***
The Design and Implementation of the FreeBSD Operating System (http://www.amazon.com/dp/0321968972/)
We mentioned when the pre orders were up, but now "The Design and Implementation of the FreeBSD Operating System, 2nd edition" seems to be shipping out
If you're interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy
We've even had all (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache) three (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) authors (http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson) on the show before!
***
OpenBSD's systemd replacement updates (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention
One of the developers writes in to Undeadly, detailing what's going on and what the overall status is
He also clears up any confusion about "porting systemd to BSD" (that's not what's going on) or his code ever ending up in base (it won't)
The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***
Feedback/Questions
Brad writes in (http://slexy.org/view/s20jrx0nIf)
Ben writes in (http://slexy.org/view/s21hFUJ2ju)
Mathieu writes in (http://slexy.org/view/s21RgSzOv4)
Steve writes in (http://slexy.org/view/s2P1mzalPh)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, adrian chadd, wireless, wifi, aircrack-ng, kismet, packet injection, monitor mode, libressl, openssl, qemu, zfs, jails, headless, remote, pfsense, systemd, netgate, apu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
MeetBSD 2014 is approaching (http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/)
The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California
MeetBSD has an "unconference" format, which means there will be both planned talks and community events
All the extra details will be on their site (https://www.meetbsd.com/) soon
It also has hotels and various other bits of useful information - hopefully with more info on the talks to come
Of course, EuroBSDCon is coming up before then
***
First experiences with OpenBSD (https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html)
A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"
The author read the famous "BSD for Linux users (http://www.over-yonder.net/~fullermd/rants/bsd4linux/01)" series (that most of us have surely seen) and decided to give BSD a try
He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"
From there, it talks about how he used the OpenBSD USB image and got a fully-working system
He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration
Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***
NetBSD rump kernels on bare metal (and Kansai OSC report) (https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from)
When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right
However, NetBSD's rump kernels - a very unique concept - make this process a lot easier
This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week
Also have a look back at episode 8 (http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction) for our interview about rump kernels and what exactly they do
While on the topic of NetBSD, there were also a couple of very detailed reports (http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html) (with lots of pictures!) of the various NetBSD-themed booths at the 2014 Kansai Open Source Conference (http://d.hatena.ne.jp/mizuno-as/20140806/1407307913) that we wanted to highlight
***
OpenSSL and LibreSSL updates (https://www.openssl.org/news/secadv_20140806.txt)
OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)
Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more
LibreSSL released a new version (http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2) to address most of the vulnerabilities, but wasn't affected by some of them
Whichever version of whatever SSL you use, make sure it's patched for these issues
DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***
Interview - Robert Watson - rwatson@freebsd.org (mailto:rwatson@freebsd.org)
FreeBSD architecture, security research techniques, exploit mitigation
Tutorial
Protecting traffic with a BSD-based VPN (http://www.bsdnow.tv/tutorials/openvpn)
News Roundup
A FreeBSD-based CGit server (https://lechindianer.de/blog/2014/08/06/freebsd-cgit/)
If you use git (like a certain host of this show) then you've probably considered setting up your own server
This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend
It even shows you how to set up multiple repos with key-based user separation and other cool things
The author of the post is also a listener of the show, thanks for sending it in!
***
Backup devices for small businesses (http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html)
In this article, different methods of data storage and backup are compared
After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer
He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers
It also goes over some of the hardware specifics in the FreeNAS Mini
***
A new Xenocara interview (http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html)
As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara
If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches
In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing
Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***
Building a high performance FreeBSD samba server (https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/)
If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?
FreeBSD, ZFS and Samba obviously!
The master image and related files clock in at over 20GB, and will be accessed at the same time by all of those clients
This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)
It doesn't even require the newest or best hardware with the right changes, pretty cool
***
Feedback/Questions
An interesting Reddit thread (http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/) (or two (http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch))
PB writes in (http://slexy.org/view/s21t7L5bqO)
Sean writes in (http://slexy.org/view/s20MFywDqZ)
Steve writes in (http://slexy.org/view/s2Td6nq11J)
Lachlan writes in (http://slexy.org/view/s215MlpJYV)
Justin writes in (http://slexy.org/view/s2N4JKkoKt)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>49: The PC-BSD Tour</title>
  <link>https://www.bsdnow.tv/49</link>
  <guid isPermaLink="false">ccc19842-ae62-43a9-8f82-44f3f281de42</guid>
  <pubDate>Wed, 06 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ccc19842-ae62-43a9-8f82-44f3f281de42.mp3" length="59661652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD foundation semi-annual newsletter (https://www.freebsdfoundation.org/press/2014jul-newsletter)
The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation
"In fact after reading [the president's] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!"
It talks about the FreeBSD journal (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) as being one of the most exciting things they've launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT
The full list of funded projects is included, also with details in the financial reports
There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, intel nuc, nuc, gui, ssl, tls, libressl, openssl, foundation, bafug, talk, presentation, recording, bhyve, libvirt, rss, netmap, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>48: Liberating SSL</title>
  <link>https://www.bsdnow.tv/48</link>
  <guid isPermaLink="false">e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809</guid>
  <pubDate>Wed, 30 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809.mp3" length="43106548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-04-2014-06.html)
FreeBSD has gotten quite a lot done this quarter
Changes in the way release branches are supported - major releases will get at least five years over their lifespan
A new automounter is in the works, hoping to replace amd (which has some issues)
The CAM target layer and RPC stack have gotten some major optimization and speed boosts
Work on ZFSGuru continues, with a large status report specifically for that
The report also mentioned some new committers, both source and ports
It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we've already mentioned on the show
"Foundation-sponsored work resulted in 226 commits to FreeBSD over the April to June period"
***
A new OpenBSD HTTPD is born (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724094043)
Work has begun on a new HTTP daemon in the OpenBSD base system
A lot of people are asking (http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/) "why?" since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?
Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn't trying to be a full-featured replacement)
It's partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter
This has the added benefit of the usual, easy-to-understand syntax and privilege separation 
There's a very brief man page (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8) online already
It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs
Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***
pkgng 1.3 announced (https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html)
The newest version of FreeBSD's second generation package management system (http://www.bsdnow.tv/tutorials/pkgng) has been released, with lots of new features
It has a new "real" solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)
Lots of the code has been sandboxed for extra security
You'll probably notice some new changes to the UI too, making things more user friendly
A few days later 1.3.1 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=362996) was released to fix a few small bugs, then 1.3.2 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363108) shortly thereafter and 1.3.3 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363363) yesterday
***
FreeBSD after-install security tasks (http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be)
A number of people have written in to ask us "how do I secure my BSD box after I install it?"
With this blog post, hopefully most of their questions will finally be answered in detail
It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things
Not only does it just list things to do, but the post also does a good job of explaining why you should do them
Maybe we'll see some more posts in this series in the future
***
Interview - Brent Cook - bcook@openbsd.org (mailto:bcook@openbsd.org) / @busterbcook (https://twitter.com/busterbcook)
LibreSSL's portable version and development
News Roundup
FreeBSD Mastery - Storage Essentials (https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials)
MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)'s new book about the FreeBSD storage subsystems now has an early draft available
Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes
Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance
You'll get access to the completed (e)book when it's done if you buy the early draft
The suggested price is $8
***
Why BSD and not Linux? (http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/)
Yet another thread comes up asking why you should choose BSD over Linux or vice-versa
Lots of good responses from users of the various BSDs
Directly ripping a quote: "Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is "GCC free". DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity."
And "Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS."
Some other users share their switching experiences - worth a read
***
More g2k14 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550)
Following up from last week's huge list (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv) of hackathon reports, we have a few more
Landry Breuil (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550) spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream
Andrew Fresh (http://undeadly.org/cgi?action=article&amp;amp;sid=20140728122850) enjoyed his first hackathon, pushing OpenBSD's perl patches upstream and got tricked into rewriting the adduser utility in perl
Ted Unangst (http://undeadly.org/cgi?action=article&amp;amp;sid=20140729070721) did his usual "teduing" (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth
Luckily we didn't have to cover 20 new ones this time!
***
BSDTalk episode 243 (http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html)
The newest episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, featuring an interview with Ingo Schwarze of the OpenBSD team
The main topic of discussion is mandoc, which some users might not be familiar with
mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it's not built by default)
We'll catch up to you soon, Will!
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s2xLRQytAZ)
Stephen writes in (http://slexy.org/view/s21AYng20n)
Sha'ul writes in (http://slexy.org/view/s2DwLRdQDS)
Florian writes in (http://slexy.org/view/s2E05L31BC)
Bob Beck writes in (http://slexy.org/view/s21Nmg3Jrk) - and note the "Caution" section that was added to libressl.org (http://www.libressl.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, portable, openssh, security, linux, arc4random, intrinsic functions, rng, prng, status report, pkgng, openhttpd, relayd, httpd, web server, zfsguru, zfs, freebsd mastery, book, storage, ufs, geom, disks, presentation, talk, comparison, mandoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>47: DES Challenge IV</title>
  <link>https://www.bsdnow.tv/47</link>
  <guid isPermaLink="false">2c9f4e68-6474-41f9-ab80-bb40fbb76855</guid>
  <pubDate>Wed, 23 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c9f4e68-6474-41f9-ab80-bb40fbb76855.mp3" length="66811828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
g2k14 hackathon reports (http://www.openbsd.org/hackathons.html)
Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon
Lots of work got done - in just the first two weeks of July, there were over 1000 commits (http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;b=201407&amp;amp;w=2) to their CVS tree
Some of the developers wrote in to document what they were up to at the event
Bob Beck (http://undeadly.org/cgi?action=article&amp;amp;sid=20140713220618) planned to work on kernel stuff, but then "LibreSSL happened" and he spent most of his time working on that
Miod Vallat (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718072312) also tells about his LibreSSL experiences
Brent Cook (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718090456), a new developer, worked mainly on the portable version of LibreSSL (and we'll be interviewing him next week!)
Henning Brauer (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714094454) worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)
Martin Pieuchot (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714191912) fixed some bugs in the USB stack, softraid and misc other things
Marc Espie (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714202157) improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency
Martin Pelikan (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715120259) integrated read-only ext4 support
Vadim Zhukov (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715094848) did lots of ports work, including working on KDE4
Theo de Raadt (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715212333) created a new, more secure system call, "sendsyslog" and did a lot of work with /etc, sysmerge and the rc scripts
Paul Irofti (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718134017) worked on the USB stack, specifically for the Octeon platform
Sebastian Benoit (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719104939) worked on relayd filters and IPv6 code
Jasper Lievisse Adriaanse (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719134058) did work with puppet, packages and the bootloader
Jonathan Gray (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719082410) imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection
Stefan Sperling (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125235) fixed a lot of issues with wireless drivers
Florian Obser (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125020) did many things related to IPv6
Ingo Schwarze (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721090411) worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface
Ken Westerback (http://undeadly.org/cgi?action=article&amp;amp;sid=20140722071413) hacked on dhclient and dhcpd, and also got dump working on 4k sector drives
Matthieu Herrb (http://undeadly.org/cgi?action=article&amp;amp;sid=20140723142224) worked on updating and modernizing parts of xenocara
***
FreeBSD pf discussion takes off (https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html)
Concerns from last week, about FreeBSD's packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the "questions" and "current" mailing lists (unfortunately people didn't always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)
Straight from the SMP FreeBSD pf maintainer: "no one right now [is actively developing pf on FreeBSD]"
Searching for documentation online for pf is troublesome because there are two incompatible syntaxes
FreeBSD's pf man pages are lacking, and some of FreeBSD's documentation still links to OpenBSD's pages, which won't work anymore - possibly turning away would-be BSD converts because it's frustrating
There's also the issue of importing patches from pfSense, but most of those still haven't been done either
Lots of disagreement among developers vs. users...
Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren't interested
Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions
Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning's claims about OpenBSD's improved speed as "uncorroborated claims" (but neither side has provided any public benchmarks)
Gleb had to abandon his work on FreeBSD's pf because funding ran out
***
LibreSSL progress update (http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched)
LibreSSL's first few portable releases have come out and they're making great progress, releasing 2.0.3 two days ago (http://marc.info/?l=openbsd-tech&amp;amp;m=140599450206255&amp;amp;w=2)
Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list
However, there has already been some drama... with Linux users
There was a problem with Linux's PRNG, and LibreSSL was unforgiving (https://twitter.com/MiodVallat/status/489122763610021888) of it, not making an effort to randomize something that could not provide real entropy
This "problem" doesn't affect OpenBSD's native implementation, only the portable version
The developers (http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl) decide to weigh in (http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit) to calm the misinformation and rage
A fix was added in 2.0.2, and Linux may even get a new system call (http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666) to handle this properly now - remember to say thanks, guys
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has a really good post (http://www.tedunangst.com/flak/post/this-is-why-software-sucks) about the whole situation, definitely check it out
As a follow-up from last week, bapt says they're working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you're a port maintainer, please test your ports against it
***
Preparation for NetBSD 7 (http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html)
The release process for NetBSD 7.0 is finally underway
The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September
If you run NetBSD, that'll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)
They're also looking for some help updating documentation and fixing any bugs that get reported
Another formal announcement will be made when the beta binaries are up
***
Interview - Dag-Erling Smørgrav - des@freebsd.org (mailto:des@freebsd.org) / @RealEvilDES (https://twitter.com/RealEvilDES)
The role of the FreeBSD Security Officer, recent ports features, various topics
News Roundup
BSDCan ports and packages WG (http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/)
Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages
Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages
There's also some detail about the signing infrastructure and different mirrors
Ports people and source people need to talk more often about ABI breakage
The post also includes information about pkg 1.3, the old pkg tools' EOL, the quarterly stable package sets and a lot more (it's a huge post!)
***
Cross-compiling ports with QEMU and poudriere (http://blog.ignoranthack.me/?p=212)
With recent QEMU features, you can basically chroot into a completely different architecture
This article goes through the process of building ARMv6 packages on a normal X86 box
Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now
The poudriere-devel port now has a "qemu user" option that will pull in all the requirements
Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***
Cloning FreeBSD with ZFS send (http://blather.michaelwlucas.com/archives/2108)
For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen
This post shows his entire process in creating a mirror machine, using ZFS for everything
The "zfs send" and "zfs snapshot" commands really come in handy for this
He does the whole thing from a live CD, pretty impressive
***
FreeBSD Overview series (http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/)
A new blog series we stumbled upon about a Linux user switching to BSD
In part one, he gives a little background on being "done with Linux distros" and documents his initial experience getting and installing FreeBSD 10
He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels
Most of what he was used to on Linux was already in the default FreeBSD (except bash...)
Part two (http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/) documents his experiences with pkgng and ports 
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s214FYbOKL)
Rick writes in (http://slexy.org/view/s21cWLhzj4)
Clint writes in (http://slexy.org/view/s21A4grtH0)
Esteban writes in (http://slexy.org/view/s27fQHz8Se)
Ben writes in (http://slexy.org/view/s21QscO4Cr)
Matt sends in pictures of his FreeBSD CD collection (https://imgur.com/a/Ah444)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, prng, linux, des, aes, encryption, cryptography, Dag-Erling Smørgrav, security, hackathon, pf, packet filter, firewall, smp, multithreading, ixsystems, tarsnap, bsdcan, cheri, zfs, qemu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
pfSense 2.1.4 released (https://blog.pfsense.org/?p=1377)
The pfSense team (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) has released 2.1.4, shortly after 2.1.3 - it's mainly a security release
Included within are eight security fixes, most of which are pfSense-specific
OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)
It also includes a large number of various other bug fixes
Update all your routers!
***
DragonflyBSD's pf gets SMP (http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html)
While we're on the topic of pf...
Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas
Stemming from a user's complaint (http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html), Matthew Dillon did his own work on pf to make it SMP-aware
Altering your configuration (http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html)'s ruleset can also help speed things up, he found
When will OpenBSD, the source of pf, finally do the same?
***
ChaCha usage and deployment (http://ianix.com/pub/chacha-deployment.html)
A while back, we talked to djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5
This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20
OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it
Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not
Unfortunately, this article has one mistake: FreeBSD does not use it (https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html) - they still use the broken RC4 algorithm
***
BSDMag June 2014 issue (http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue)
The monthly online BSD magazine releases their newest issue
This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities
The free pdf file is available for download as always
***
Interview - Craig Rodrigues - rodrigc@freebsd.org (mailto:rodrigc@freebsd.org)
FreeBSD's continuous (https://wiki.freebsd.org/Jenkins) testing (https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p) infrastructure (https://jenkins.freebsd.org/jenkins/)
Tutorial
Creating pre-patched OpenBSD ISOs (http://www.bsdnow.tv/tutorials/stable-iso)
News Roundup
Preauthenticated decryption considered harmful (http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful)
Responding to a post (https://www.imperialviolet.org/2014/06/27/streamingencryption.html) from Adam Langley, Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) talks a little more about how signify and pkg_add handle signatures
In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns
With signify, now everything is fully downloaded and verified before tar is even invoked
The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post
Be sure to also read the original post from Adam, lots of good information
***
FreeBSD 9.3-RC2 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html)
As the -RELEASE inches closer, release candidate 2 is out and ready for testing
Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things
The updated bsdconfig will use pkgng style packages now too
A lesser known fact: there are also premade virtual machine images you can use too
***
pkgsrcCon 2014 wrap-up (http://saveosx.org/pkgsrcCon/)
In what may be the first real pkgsrcCon article we've ever had!
Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event
Unfortunately no recordings to be found...
***
PostgreSQL FreeBSD performance and scalability (https://kib.kiev.ua/kib/pgsql_perf.pdf)
FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales
On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings
Lots of technical details if you're interested in getting the best performance out of your hardware
It also includes specific kernel options he used and the rest of the configuration
If you don't want to open the pdf file, you can use this link (https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf) too
***
Feedback/Questions
James writes in (http://slexy.org/view/s24pFjUPe4)
Klemen writes in (http://slexy.org/view/s21OogIgTu)
John writes in (http://slexy.org/view/s21rLcemNN)
Brad writes in (http://slexy.org/view/s203Qsx6CZ)
Adam writes in (http://slexy.org/view/s2eBj0FfSL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>43: Package Design</title>
  <link>https://www.bsdnow.tv/43</link>
  <guid isPermaLink="false">d4b10034-d20a-44a6-a918-a57335debcae</guid>
  <pubDate>Wed, 25 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d4b10034-d20a-44a6-a918-a57335debcae.mp3" length="62389876" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 talks and schedule (http://2014.eurobsdcon.org/talks-and-schedule/)
The talks and schedules for EuroBSDCon 2014 are finally revealed
The opening keynote is called "FreeBSD, looking forward to another 10 years" by jkh
Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great
It looks like Theo even has a talk, but the title isn't on the page... how mysterious
There are also days dedicated to some really interesting tutorials
Register now, the conference is on September 25-28th in Bulgaria
If you see Allan and Kris walking towards you and you haven't given us an interview yet... well you know what's going to happen
Why aren't the videos up from last year yet? Will this year also not have any?
***
FreeNAS vs NAS4Free (http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/)
More mainstream news covering BSD, this time with an article about different NAS solutions
In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free
Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect
Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project
"One is pleasantly functional; the other continues devolving during a journey of pain" - uh oh, who's the loser?
***
Quality software costs money, heartbleed was free (https://queue.acm.org/detail.cfm?id=2636165)
PHK (http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail) writes an article for ACM Queue about open source software projects' funding efforts
A lot of people don't realize just how widespread open source software is - TVs, printers, gaming consoles, etc
The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish's funding
The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them
On that subject, "Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software"
Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***
Geoblock evasion with pf and OpenBSD rdomains (https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s)
Geoblocking is a way for websites to block visitors based on the location of their IP
This is a blog post about how to get around it, using pf and rdomains
It has the advantage of not requiring any browser plugins or DNS settings on the users' computers, you just need to be running OpenBSD on your router (hmm, if only a website had a tutorial about that (http://www.bsdnow.tv/tutorials/openbsd-router)...)
In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia
It's got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***
Interview - Marc Espie - espie@openbsd.org (mailto:espie@openbsd.org) / @espie_openbsd (https://twitter.com/espie_openbsd)
OpenBSD's package system, building cluster, various topics
Tutorial
Keeping your BSD up to date (http://www.bsdnow.tv/tutorials/upgrade)
News Roundup
BoringSSL and LibReSSL (https://www.imperialviolet.org/2014/06/20/boringssl.html)
Yet another OpenSSL fork pops up, this time from Google, called BoringSSL
Adam Langley has a blog post about it, why they did it and how they're going to maintain it
You can easily browse the source code (https://boringssl.googlesource.com/)
Theo de Raadt also weighs in (http://marc.info/?l=openbsd-tech&amp;amp;m=140332790726752&amp;amp;w=2) with how this effort relates to LibReSSL
More eyes on the code is good, and patches will be shared between the two projects
***
More BSD Tor nodes wanted (http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html)
Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous
Originally discussed (https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html) on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network
If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.
The EFF is also holding a Tor challenge (https://www.eff.org/torchallenge/) for people to start up new relays and keep them online for over a year
Check out our Tor tutorial (http://www.bsdnow.tv/tutorials/tor) and help out the network, and promote BSD at the same time!
***
FreeBSD 10 OpenStack images (https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html)
OpenStack, to quote Wikipedia, is "a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution."
The article goes into detail about creating a FreeBSD instant, installing and converting it for use with "bsd-cloudinit"
The author of the article is a regular listener and emailer of the show, hey!
***
BSDday 2014 call for papers (https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html)
BSD Day, a conference not so well-known, is going to be held August 9th in Argentina
It was created in 2008 and is the only BSD conference around that area
The "call for papers" was issued, so if you're around Argentina and use BSD, consider submitting a talk
Sysadmins, developers and regular users are, of course, all welcome to come to the event
***
Feedback/Questions
Maruf writes in (http://slexy.org/view/s20nTYO2w1)
Solomon writes in (http://slexy.org/view/s21cvV6mRP)
Silas writes in (http://slexy.org/view/s2MK8sbea0)
Bert writes in (http://slexy.org/view/s2Yz97YlzI)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, packages, cluster, building, pkg_add, freenas, ixsystems, tarsnap, eurobsdcon, bulgaria, 2014, talks, presentation, slides, Poul-Henning Kamp, phk, schedule, freenas, nas4free, nas, geoblock, evasion, bypassing, ip ban, pf, firewall, rdomains, glusterfs, marc espie, boringssl, openssl, libressl, upgrades, how to upgrade, update, rebuild, tor, tor nodes, relays, exit node, eff, tor challenge, aslr, pie, security, bsdday, openstack, bsd-cloudinit, cloud computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>41: Commit This Bit</title>
  <link>https://www.bsdnow.tv/41</link>
  <guid isPermaLink="false">0017fbdd-17f8-464f-8bd5-94c6070bbd9a</guid>
  <pubDate>Wed, 11 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0017fbdd-17f8-464f-8bd5-94c6070bbd9a.mp3" length="48292564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD moves to Bugzilla (https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html)
Historically, FreeBSD has used the old GNATS system for keeping track of bug reports
After years and years of wanting to switch, they've finally moved away from GNATS to Bugzilla
It offers a lot of advantages, is much more modern and actively maintained and 
There's a new workflow chart (http://people.freebsd.org/~eadler/bugrelocation/workflow.html) for developers to illustrate the new way of doing things
The old "send-pr" command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)
This will hopefully make reporting bugs a lot less painful
***
DIY NAS: EconoNAS 2014 (http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html)
We previously covered this blog last year, but the 2014 edition is up
More of a hardware-focused article, the author details the parts he's using for a budget NAS
Details the motherboard, RAM, CPU, hard drives, case, etc
With a set goal of $500 max, he goes just over it - $550 for all the parts
Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***
DragonflyBSD 3.8 released (http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html)
Justin (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) announced the availability of DragonflyBSD 3.8.0
Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts
It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions
Work continues on for the Intel graphics drivers, but it's currently limited to the HD4000 and Ivy Bridge series
See the release page (http://www.dragonflybsd.org/release38/) for more info and check the link for source-based upgrade instructions
***
OpenZFS European conference 2014 (http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference)
There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure
Matt Ahrens, Introduction (http://www.youtube.com/watch?v=Mk1czZs6vkQ)
Michael Alexander, FhGFS performance on ZFS (http://www.youtube.com/watch?v=Ak1HB507-xY)
Andriy Gapon, Testing ZFS on FreeBSD (http://www.youtube.com/watch?v=oB-QDwVuBH4)
Luke Marsden, HybridCluster: ZFS in the cloud (http://www.youtube.com/watch?v=ISI9Ppj3kTo)
Vadim Comănescu, Syneto: continuously delivering a ZFS-based OS (http://www.youtube.com/watch?v=1xK94v0BedE)
Chris George, DDRdrive ZIL accelerator: random write revelation (http://www.youtube.com/watch?v=ScNHjWBQYQ8)
Grenville Whelan, High-Availability (http://www.youtube.com/watch?v=tiTYZykCeDo)
Phil Harman, Harman Holistic (https://www.youtube.com/watch?v=ApjkrBVlPXk)
Mark Rees, Storiant and OpenZFS (http://www.youtube.com/watch?v=41yl23EACns)
Andrew Holway, EraStor ZFS appliances (http://www.youtube.com/watch?v=b4L0DRvKJxo)
Dan Vâtca, Syneto and OpenZFS (http://www.youtube.com/watch?v=pPOW8bwUXxo)
Luke Marsden, HybridCluster and OpenZFS (http://www.youtube.com/watch?v=uSM1s1aWlZE)
Matt Ahrens, Delphix and OpenZFS (http://www.youtube.com/watch?v=UaRdzUOsieA)
Check the link for slides and other goodies
***
Interview - Benedict Reuschling - bcr@freebsd.org (mailto:bcr@freebsd.org)
BSD documentation, getting commit access, unix education, various topics
News Roundup
Getting to know your portmgr, Steve Wills (http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/)
"It is my pleasure to introduce Steve Wills, the newest member of the portmgr team"
swills is an all-round good guy, does a lot for ports (especially the ruby ports)
In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more
He used to work for Red Hat, woah
***
BSDTalk episode 242 (http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html)
This time on BSDTalk, Will interviews Chris Buechler (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) from pfSense
Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes
They also touch on recent concerns in the pfSense community about their license change, that they may be "going commercial" and closing the source - so tune in to find out what their future plans are for all of that
***
Turn old PC hardware into a killer home server (http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html)
Lots of us have old hardware lying around doing nothing but collecting dust
Why not turn that old box into a modern file server with FreeNAS and ZFS?
This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)
Most of our users are already familiar with all of this stuff, nothing too advanced
Good to see BSD getting some well-deserved attention on a big mainstream site
***
Unbloating the VAX install CD (https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd)
After a discussion on the VAX mailing list, something very important came to the attention of the developers...
You can't boot NetBSD on a VAX box with 16MB of RAM from the CD image
This blog post goes through the developer's adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller
In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s211mNScBr)
Reynold writes in (http://slexy.org/view/s21JA8BVmZ)
Bostjan writes in (http://slexy.org/view/s2kwS3ncTY)
Paul writes in (http://slexy.org/view/s2VgjXUfW9)
John writes in (http://slexy.org/view/s202AAQUXt)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnats, send-pr, sendbug, bugzilla, bug tracker, iso, cdr, dvd, patches, applied, commit bit, documentation, bsdcan, 2014, 9.3-RELEASE, 9.3, release, stable, advocacy, openssl, libressl, security, vulnerability, bsdtalk, pfsense, license, openzfs, zfs, presentation, talk, matthew ahrens, delphix, hybridcluster, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 11 goals and discussion (http://blather.michaelwlucas.com/archives/2053)
Something that actually happened at BSDCan this year...
During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE
Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support
A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more
There's also some notes from the devsummit virtualization session (http://blather.michaelwlucas.com/archives/2060), mostly talking about bhyve
Lastly, he also provides some notes about ports and packages (http://blather.michaelwlucas.com/archives/2065) and where they're going
***
An SSH honeypot with OpenBSD and Kippo (http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/)
Everyone loves messing with script kiddies, right?
This blog post introduces Kippo (https://code.google.com/p/kippo/), an SSH honeypot tool, and how to use it in combination with OpenBSD
It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely
You can use this to get new 0day exploits or find weaknesses in your systems
OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***
NetBSD foundation financial report (https://www.netbsd.org/foundation/reports/financial/2013.html)
The NetBSD foundation has posted their 2013 financial report
It's a very "no nonsense" page, pretty much only the hard numbers
In 2013, they got $26,000 of income in donations
The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else
Be sure to donate to whichever BSDs you like and use!
***
Building a fully-encrypted NAS with OpenBSD (http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html)
Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing
This article takes a look at the OpenBSD side and explains how (http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html) to build a NAS with security in mind
The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected
The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too
There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***
Interview - Brian Callahan &amp;amp; Aaron Bieber - admin@lists.nycbug.org (mailto:admin@lists.nycbug.org) &amp;amp; admin@cobug.org (mailto:admin@cobug.org)
Forming a local BSD Users Group
Tutorial
The basics of pkgsrc (http://www.bsdnow.tv/tutorials/pkgsrc)
News Roundup
FreeBSD periodic mails vs. monitoring (http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/)
If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email
This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them
From bad SSH logins to Zabbix alerts, it all adds up quickly
It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***
Doing cool stuff with OpenBSD routing domains (http://www.skogsrud.net/?p=44)
A blog post from our viewer and regular emailer, Kjell-Aleksander!
He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project
This is where OpenBSD routing domains and pf come in to save the day
The blog post goes through the process with all the network details you could ever dream of
He even named his networking equipment... after us (http://i.imgur.com/penYQFP.jpg)
***
LibreSSL, the good and the bad (http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html)
We're all probably familiar with OpenBSD's fork of OpenSSL at this point
However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"
This article talks about some of the cryptographic development challenges involved with maintaining such a massive project
You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled
It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/)
Lots going on in PCBSD land this week, AppCafe has been redesigned
The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update
In the more recent post (http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/), there's some further explanation of the PBI system and the reason for the transition
It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2UbEhgjce)
Daniel writes in (http://slexy.org/view/s21XU0y3JP)
Sean writes in (http://slexy.org/view/s2QQtuawFl)
tsyn writes in (http://slexy.org/view/s20XrT5Q8U)
Chris writes in (http://slexy.org/view/s2ayZ1nsdv)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>35: Puffy Firewall</title>
  <link>https://www.bsdnow.tv/35</link>
  <guid isPermaLink="false">203904d9-509c-4727-918f-d5e6a6276cf8</guid>
  <pubDate>Wed, 30 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/203904d9-509c-4727-918f-d5e6a6276cf8.mp3" length="57157492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
ALTQ removed from PF (http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959)
Kicking off our big PF episode...
The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current
There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the "queue" keyword with "oldqueue" in your pf.conf
As of 5.6, due about six months from now, you'll have to change your ruleset to the new syntax if you're using it for bandwidth shaping
After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem
This doesn't affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***
FreeBSD Quarterly Status Report (https://www.freebsd.org/news/status/report-2014-01-2014-03.html)
The quarterly status report from FreeBSD is out, detailing some of the project's ongoing tasks
Some highlights include the first "stable" branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added
We've got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team
LOTS of details and LOTS of topics to cover, give it a read
***
OpenBSD's OpenSSL rewrite continues with m2k14 (http://undeadly.org/cgi?action=article&amp;amp;sid=20140417184158)
A mini OpenBSD hackathon (http://www.openbsd.org/hackathons.html) begins in Morocco, Africa
You can follow the changes in the -current CVS log (http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/), but a lot of work (http://undeadly.org/cgi?action=article&amp;amp;sid=20140418063443) is mainly going towards the OpenSSL cleaning
We've got two trip (http://undeadly.org/cgi?action=article&amp;amp;sid=20140429121423) reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140425115340) so far, hopefully we'll have some more to show you in a future episode
You can see some of the more interesting quotes (http://opensslrampage.org/) from the tear-down or see everything (http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf)
Apparently (http://undeadly.org/cgi?action=article&amp;amp;sid=20140423045847) they are going to call the fork "LibreSSL (https://news.ycombinator.com/item?id=7623789)" ....
What were the OpenSSL developers thinking (http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf)? The RSA private key was used to seed the entropy!
We also got some mainstream news coverage (http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/) and another post from Ted (http://www.tedunangst.com/flak/post/origins-of-libressl) about the history of the fork
Definitely consider donating to the OpenBSD foundation (http://www.openbsdfoundation.org/donations.html), this fork will benefit all the other BSDs too
***
NetBSD 6.1.4 and 6.0.5 released (https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and)
New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes
The main update is - of course - the heartbleed vulnerability
Also includes fixes for other security issues and even a kernel panic... on Atari
Patch your Ataris right now, this is serious business
***
Interview - Peter Hansteen - peter@bsdly.net (mailto:peter@bsdly.net) / @pitrh (https://twitter.com/pitrh)
The Book of PF: 3rd edition
Tutorial
BSD Firewalls: PF (http://www.bsdnow.tv/tutorials/pf)
News Roundup
New Xorg now the default in FreeBSD (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=351411)
For quite a while now, FreeBSD has had two versions of X11 in ports
The older, stable version was the default, but you could install a newer one by having "WITHNEWXORG" in /etc/make.conf
They've finally made the switch for 10-STABLE and 9-STABLE
Check this wiki page (https://wiki.freebsd.org/Graphics) for more info
***
GSoC-accepted BSD projects (https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation)
The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what's planned
OpenBSD's list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon
The FreeBSD list (https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd) was also posted
Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more
Good luck to all the students participating, hopefully they become full time BSD users
***
Complexity of FreeBSD VFS using ZFS as an example (http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/)
HybridCluster posted the second part of their VFS and ZFS series
This new post has lots of technical details once again, definitely worth reading if you're a ZFS guy
Of course, also watch episode 24 (http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud) for our interview with HybridCluster - they do really interesting stuff
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/)
Preload has been ported over, it's a daemon that prefetches applications
PCBSD is developing their own desktop environment, Lumina (there's also an FAQ (http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/))
It's still in active development, but you can try it out by installing from ports
We'll be showing a live demo of it in a few weeks (when development settles down a bit)
Some kid in Australia subjects his poor mother to being on camera (https://www.youtube.com/watch?v=ETxhbf3-z18) while she tries out PCBSD and gives her impressions of it
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pf, firewall, pfsense, ipfw, ipfilter, router, packet filter, book of pf, third edition, 3rd, bsdcan, presentation, security, peter hansteen, peter n.m. hansteen, pitrh, iptables, npf, nostarch, no starch press, m2k14, hackathon, libressl, openssl, fork</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
BSDCan schedule, speakers and talks (https://www.bsdcan.org/2014/schedule/)
This year's BSDCan will kick off on May 14th in Ottawa
The list of speakers (https://www.bsdcan.org/2014/schedule/speakers.en.html) is also out
And finally the talks (https://www.bsdcan.org/2014/schedule/events.en.html) everyone's looking forward to
Lots of great tutorials and talks, spanning a wide range of topics of interest
Be sure to come by so you can and meet Allan and Kris in person and get BSDCan shirts (https://twitter.com/bsdcan/status/454990067552247808)
***
NYCBSDCon talks uploaded (https://www.youtube.com/watch?v=4bPduH6O7lI)
The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon
Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"
Dru Lavigne's talk (https://www.youtube.com/watch?v=DAmZ3cbfigA), "ZFS Management Tools in FreeNAS and PC-BSD"
Scott Long's talk (https://www.youtube.com/watch?v=FL5U4wr86L4), "Serving one third of the Internet via FreeBSD"
Michael W. Lucas' talk (https://www.youtube.com/watch?v=buo5JlMnGPI), "BSD Breaking Barriers"
***
FreeBSD Journal, issue 2 (http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html)
The bi-monthly FreeBSD journal's second issue is out
Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates
In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc
"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"
Check our interview with GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) for more information about the journal
***
OpenSSL, more like OpenSS-Hell (http://bsd.slashdot.org/story/200567)
We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy
There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so
We finally have a timeline of events (http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html)
Reactions from ISC (https://isc.sans.edu/diary/Testing+for+Heartbleed/17933), PCBSD (http://blog.pcbsd.org/2014/04/openssl-security-update/), Tarsnap (http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html), the Tor (https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html) project (https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html), FreeBSD (https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html), NetBSD (http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc), oss-sec (http://seclists.org/oss-sec/2014/q2/index.html), PHK (https://queue.acm.org/detail.cfm?id=2602816), Varnish (https://www.varnish-cache.org/docs/trunk/phk/dough.html) and Akamai (https://blogs.akamai.com/2014/04/heartbleed-update.html)
pfSense (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) released a new version to fix it (https://blog.pfsense.org/?p=1253)
OpenBSD disabled heartbeat entirely (http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2) and is very unforgiving of the IETF (https://news.ycombinator.com/item?id=7568921)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has two good (http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf) write-ups (http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse) about the issue and how horrible the OpenSSL codebase is
A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"
Sounds like someone else (http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html) was having fun with the bug for a while too
There's also another OpenSSL bug that OpenBSD patched (http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2) - it allows an attacker to inject data from one connection into another 
OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're seeing a fork (http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252) in real time
***
Interview - Jim Brown - info@bsdcertification.org (mailto:info@bsdcertification.org)
The BSD Certification (http://bsdcertification.org/) exams
Tutorial
Building OpenBSD binary packages in bulk (http://www.bsdnow.tv/tutorials/dpb)
News Roundup
Portable signify (https://github.com/aperezdc/signify)
Back in episode 23 (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) we talked with Ted Unangst about the new "signify" tool in OpenBSD
Now there's a (completely unofficial) portable version of it on github
If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it
Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***
Foundation goals and updates (https://www.mail-archive.com/misc@openbsd.org/msg128240.html)
The OpenBSD foundation has reached their 2014 goal of $150,000
You can check their activities and goals (http://www.openbsdfoundation.org/activities.html) to see where the money is going
Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data
The FreeBSD foundation has kicked off their spring fundraising (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html) campaign
There's also a list of their activities and goals available to read through
Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/)
New PBI runtime that fixes stability issues and decreases load times
"Update Center" is getting a lot of development and improvements
Lots of misc. bug fixes and updates
***
Feedback/Questions
There's a reddit thread (http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/) we wanted to highlight - a user wants to show his friend BSD and why it's great
Brad writes in (http://slexy.org/view/s20Tso9a6v)
Sha'ul writes in (http://slexy.org/view/s21DfdV9yt)
iGibbs writes in (http://slexy.org/view/s2di8XRt73)
Matt writes in (http://slexy.org/view/s20m2g8UgV)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>11: The Gateway Drug</title>
  <link>https://www.bsdnow.tv/11</link>
  <guid isPermaLink="false">43438bdb-8de0-4237-81e2-da2f448be5ef</guid>
  <pubDate>Wed, 13 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/43438bdb-8de0-4237-81e2-da2f448be5ef.mp3" length="78628291" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:49:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.
Headlines
OpenSSH 6.4 released (http://openssh.com/txt/release-6.4)
Security fixes in OpenSSH (http://openssh.com/) don't happen very often
6.4 fixes a memory corruption problem, no new features
If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.
Disabling AES-GCM in the server configuration is a workaround
Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9's base OpenSSL is unaffected, for example)
Full details here (http://www.openssh.com/txt/gcmrekey.adv)
***
Getting to know your portmgr-lurkers (http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/)
Next entry in portmgr interview series
This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously
Lots of questions ranging from why he uses BSD to what he had for breakfast
Another one (http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/) was since released, with Antoine Brodin aka antoine@
***
FUSE in OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20131108082749)
As we glossed over last week, FUSE was recently added to OpenBSD
Now the guys from the OpenBSD Journal have tracked down more information
This version is released under an ISC license
Should be in OpenBSD 5.5, released a little less than 6 months from now
Will finally enable things like SSHFS to work in OpenBSD
***
Automated submission of kernel panic reports (https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html)
New tool from Colin Percival
Saves information about kernel panics and emails it to FreeBSD
Lets you review before sending so you can edit out any private info
Automatically encrypted before being sent
FreeBSD never kernel panics so this won't get much use
***
Interview - Justin Sherrill - justin@dragonflybsd.org (mailto:justin@dragonflybsd.org) / @dragonflybsd (https://twitter.com/dragonflybsd)
DragonflyBSD 3.6 and the Dragonfly Digest (http://www.shiningsilence.com/dbsdlog/)
Tutorial
Building an OpenBSD Router (http://www.bsdnow.tv/tutorials/openbsd-router)
News Roundup
BSD router project 1.5 released (http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/)
Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router
It's an alternative to pfSense, but not nearly as well known or popular
New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes
Fits on a 256MB Compact Flash/USB drive
***
Curve25519 now default key exchange (http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e)
We mentioned in an earlier episode about a patch for curve25519 (http://cr.yp.to/ecdh.html)
Now it's become the default for key exchange
Will probably make its way into OpenSSH 6.5, would've been in 6.4 if we didn't have that security vulnerability
It's interesting to see all these big changes in cryptography in OpenBSD lately
***
FreeBSD kernel selection in boot menu (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=257650)
Adds a kernel selection menu to the beastie menu
List of kernels is taken from 'kernels' in loader.conf as a space or comma separated list of names to display (up to 9)
From our good buddy Devin Teske (http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities)
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/)
PCDM has officially replaced GDM as the default login manager
New ISO build scripts (we got a sneak preview last week)
Lots of bug fixes
Second set of 10-STABLE ISOs available with new artwork and much more
***
Theo de Raadt speaking at MUUG (http://undeadly.org/cgi?action=article&amp;amp;sid=20131113074042&amp;amp;mode=expanded&amp;amp;count=0)
Theo will be speaking at Manitoba UNIX User Group in Winnipeg
On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)
If you're watching the show live you have time to make plans, if you're watching the downloaded version it might be happening right now!
No agenda, but expect some OpenBSD discussion
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s21YXhiLRB)
James writes in (http://slexy.org/view/s215EjcgdM)
Allen writes in (http://slexy.org/view/s21mCP2ecL)
Chess writes in (http://slexy.org/view/s207ePFrna)
Frank writes in (http://slexy.org/view/s20iVFXJve)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, building, bsd, router, gateway, soho, small home office, pcbsd, server, tutorial, guide, howto, interview, firewall, network, hammer fs, dragonfly, openssh, 6.4, dragonfly digest, aes gcm, openssl, bsd router project, tbrp, portmgr, fuse, filesystem in userspace, kernel panic, automatic</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
