<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 12:39:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Owncloud”</title>
    <link>https://www.bsdnow.tv/tags/owncloud</link>
    <pubDate>Wed, 01 Apr 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>83: woN DSB</title>
  <link>https://www.bsdnow.tv/83</link>
  <guid isPermaLink="false">6b7846ec-2bb1-475f-aead-9fa2dd2d70ef</guid>
  <pubDate>Wed, 01 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6b7846ec-2bb1-475f-aead-9fa2dd2d70ef.mp3" length="46578388" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking to Kamila Součková, a Google intern. She's been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:04:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we'll be talking to Kamila Součková, a Google intern. She's been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Major changes coming in PCBSD 11 (http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/)
The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they've been known to do lately with NTP daemons and firewalls)
Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users
To solve this, they've ported over Linux's iptables, giving users a much more straightforward configuration (http://dpaste.com/2F1KM6T.txt)
While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward
Since the FreeBSD kernel doesn't support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough
People often complain about PCBSD's huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager
To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy
As we've mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its "life preserver" utility, making it simple to manage multiple snapshots too
To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users' files - hope you had that stuff backed up
***
NetBSD and FreeBSD join forces (http://www.freebsddiary.org/fretbsd.php)
The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from
What's more, none of them have any specific areas they focus on or anything like that (they're all basically the same)
That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to FretBSD
Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server
As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load
With FretBSD, your toaster can now run ZFS, so you'll never need to worry about the bread becoming silently corrupted again
***
Puffy in the cloud (http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html)
If you've ever wanted to set up a backup server, especially for family members or someone who's not as technology-savvy, you've probably realized there are a lot of options
This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon
Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc
He also mentions our pf tutorial (http://www.bsdnow.tv/tutorials/pf) being helpful in blocking script kiddies from hammering the box
Be sure to encourage your less-technical friends to always back up their important data
***
NetBSD at AsiaBSDCon (https://blog.netbsd.org/tnf/entry/asiabsdcon_2015)
Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo
It includes a wrap-up of the event, as well as a list of presentations (https://www.netbsd.org/gallery/presentations/#asiabsdcon2015) that NetBSD developers gave
Have you ever wanted even more pictures of NetBSD running on lots of devices? There's a never-ending supply, apparently
At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded pictures of all of them (http://www.ki.nu/~makoto/p15/20150315/)
There's also a video (https://www.youtube.com/watch?v=K1y9cdmLFjw) of an OMRON LUNA-II running the luna68k port
***
Interview - Kamila Součková - kamila@ksp.sk (mailto:kamila@ksp.sk) / @anotherkamila (https://twitter.com/anotherkamila)
BSD conferences, Google Summer of Code, various topics
News Roundup
FreeBSD foundation March update (https://www.freebsdfoundation.org/press/2015marchupdate.pdf)
The FreeBSD foundation has published their March update for fundraising and sponsored projects
In the document, you'll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update
They also mention our interview with the foundation president (http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii) - be sure to check it out if you haven't
***
Inside OpenBSD's new httpd (http://sdtimes.com/inside-openbsds-new-httpd-web-server/)
BSD news continues to dominate mainstream tech news sites… well not really, but they talk about it once in a while
The SD Times is featuring an article about OpenBSD's in-house HTTP server, after seeing Reyk's AsiaBSDCon presentation (http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf) about it (which he's giving at BSDCan this year, too)
In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter
Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in
The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***
Using poudriere without OpenSSL (http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html)
Last week we talked about (http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild) using LibreSSL in FreeBSD for all your ports
One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to
This blog post shows how to completely strip OpenSSL out of the poudriere (http://www.bsdnow.tv/tutorials/poudriere) build jails, something that's a lot more difficult than you'd think
If you're a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***
HAMMER and GPT in OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142755452428573&amp;amp;w=2)
Someone, presumably a Google Summer of Code student, wrote in to the lists about his HAMMER FS (http://www.bsdnow.tv/tutorials/hammer) porting proposal
He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)
There's no word yet on if it will be accepted, but it's an interesting idea to explore, especially when you consider that HAMMER really only has one developer
In more disk-related news, Ken Westerback (http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2) has been committing quite a lot of GPT-related fixes (https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=gpt&amp;amp;q=b) recently
Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone's guess
***
Feedback/Questions
Morgan writes in (http://slexy.org/view/s20e30p4qf)
Dustin writes in (http://slexy.org/view/s20clKByMP)
Stan writes in (http://slexy.org/view/s20aBlmaT5)
Mica writes in (http://slexy.org/view/s2ufFrZY9y)
***
Mailing List Gold
Developers in freefall (https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html)
Xorg thieves pt. 1 (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142786808725483&amp;amp;w=4)
Xorg thieves pt. 2 (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142790740405547&amp;amp;w=4)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, april fools, prank, fretbsd, httpd, foundation, newsletter, cloud, dropbox, owncloud, backups, asiabsdcon, eurobsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Kamila Součková, a Google intern. She&#39;s been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/" rel="nofollow">Major changes coming in PCBSD 11</a></h3>

<ul>
<li>The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they&#39;ve been known to do lately with NTP daemons and firewalls)</li>
<li>Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users</li>
<li>To solve this, they&#39;ve ported over Linux&#39;s iptables, giving users a much more <a href="http://dpaste.com/2F1KM6T.txt" rel="nofollow">straightforward configuration</a></li>
<li>While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward</li>
<li>Since the FreeBSD kernel doesn&#39;t support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough</li>
<li>People often complain about PCBSD&#39;s huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager</li>
<li>To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy</li>
<li>As we&#39;ve mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its &quot;life preserver&quot; utility, making it simple to manage multiple snapshots too</li>
<li>To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users&#39; files - hope you had that stuff backed up
***</li>
</ul>

<h3><a href="http://www.freebsddiary.org/fretbsd.php" rel="nofollow">NetBSD and FreeBSD join forces</a></h3>

<ul>
<li>The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from</li>
<li>What&#39;s more, none of them have any specific areas they focus on or anything like that (they&#39;re all basically the same)</li>
<li>That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to <strong>FretBSD</strong></li>
<li>Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server</li>
<li>As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load</li>
<li>With FretBSD, your toaster can now run ZFS, so you&#39;ll never need to worry about the bread becoming silently corrupted again
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html" rel="nofollow">Puffy in the cloud</a></h3>

<ul>
<li>If you&#39;ve ever wanted to set up a backup server, especially for family members or someone who&#39;s not as technology-savvy, you&#39;ve probably realized there are a lot of options</li>
<li>This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon</li>
<li>Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc</li>
<li>He also mentions <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">our pf tutorial</a> being helpful in blocking script kiddies from hammering the box</li>
<li>Be sure to encourage your less-technical friends to always back up their important data
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/asiabsdcon_2015" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo</li>
<li>It includes a wrap-up of the event, as well as a <a href="https://www.netbsd.org/gallery/presentations/#asiabsdcon2015" rel="nofollow">list of presentations</a> that NetBSD developers gave</li>
<li>Have you ever wanted even more pictures of NetBSD running on lots of devices? There&#39;s a never-ending supply, apparently</li>
<li>At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded <a href="http://www.ki.nu/%7Emakoto/p15/20150315/" rel="nofollow">pictures of all of them</a></li>
<li>There&#39;s also <a href="https://www.youtube.com/watch?v=K1y9cdmLFjw" rel="nofollow">a video</a> of an OMRON LUNA-II running the luna68k port
***</li>
</ul>

<h2>Interview - Kamila Součková - <a href="mailto:kamila@ksp.sk" rel="nofollow">kamila@ksp.sk</a> / <a href="https://twitter.com/anotherkamila" rel="nofollow">@anotherkamila</a></h2>

<p>BSD conferences, Google Summer of Code, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2015marchupdate.pdf" rel="nofollow">FreeBSD foundation March update</a></h3>

<ul>
<li>The FreeBSD foundation has published their March update for fundraising and sponsored projects</li>
<li>In the document, you&#39;ll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update</li>
<li>They also mention <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">our interview with the foundation president</a> - be sure to check it out if you haven&#39;t
***</li>
</ul>

<h3><a href="http://sdtimes.com/inside-openbsds-new-httpd-web-server/" rel="nofollow">Inside OpenBSD&#39;s new httpd</a></h3>

<ul>
<li>BSD news continues to <strong>dominate</strong> mainstream tech news sites… well <em>not really</em>, but they talk about it once in a while</li>
<li>The SD Times is featuring an article about OpenBSD&#39;s in-house HTTP server, after seeing Reyk&#39;s <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">AsiaBSDCon presentation</a> about it (which he&#39;s giving at BSDCan this year, too)</li>
<li>In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter</li>
<li>Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in</li>
<li>The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html" rel="nofollow">Using poudriere without OpenSSL</a></h3>

<ul>
<li>Last week we <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">talked about</a> using LibreSSL in FreeBSD for all your ports</li>
<li>One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to</li>
<li>This blog post shows how to completely strip OpenSSL out of the <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> build jails, something that&#39;s a lot more difficult than you&#39;d think</li>
<li>If you&#39;re a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142755452428573&w=2" rel="nofollow">HAMMER and GPT in OpenBSD</a></h3>

<ul>
<li>Someone, presumably a Google Summer of Code student, wrote in to the lists about his <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">HAMMER FS</a> porting proposal</li>
<li>He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)</li>
<li>There&#39;s no word yet on if it will be accepted, but it&#39;s an interesting idea to explore, especially when you consider that HAMMER really only has one developer</li>
<li>In more disk-related news, <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">Ken Westerback</a> has been committing quite a lot of <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=gpt&q=b" rel="nofollow">GPT-related fixes</a> recently</li>
<li>Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone&#39;s guess
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20e30p4qf" rel="nofollow">Morgan writes in</a></li>
<li><a href="http://slexy.org/view/s20clKByMP" rel="nofollow">Dustin writes in</a></li>
<li><a href="http://slexy.org/view/s20aBlmaT5" rel="nofollow">Stan writes in</a></li>
<li><a href="http://slexy.org/view/s2ufFrZY9y" rel="nofollow">Mica writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html" rel="nofollow">Developers in freefall</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142786808725483&w=4" rel="nofollow">Xorg thieves pt. 1</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142790740405547&w=4" rel="nofollow">Xorg thieves pt. 2</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Kamila Součková, a Google intern. She&#39;s been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/" rel="nofollow">Major changes coming in PCBSD 11</a></h3>

<ul>
<li>The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they&#39;ve been known to do lately with NTP daemons and firewalls)</li>
<li>Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users</li>
<li>To solve this, they&#39;ve ported over Linux&#39;s iptables, giving users a much more <a href="http://dpaste.com/2F1KM6T.txt" rel="nofollow">straightforward configuration</a></li>
<li>While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward</li>
<li>Since the FreeBSD kernel doesn&#39;t support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough</li>
<li>People often complain about PCBSD&#39;s huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager</li>
<li>To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy</li>
<li>As we&#39;ve mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its &quot;life preserver&quot; utility, making it simple to manage multiple snapshots too</li>
<li>To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users&#39; files - hope you had that stuff backed up
***</li>
</ul>

<h3><a href="http://www.freebsddiary.org/fretbsd.php" rel="nofollow">NetBSD and FreeBSD join forces</a></h3>

<ul>
<li>The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from</li>
<li>What&#39;s more, none of them have any specific areas they focus on or anything like that (they&#39;re all basically the same)</li>
<li>That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to <strong>FretBSD</strong></li>
<li>Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server</li>
<li>As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load</li>
<li>With FretBSD, your toaster can now run ZFS, so you&#39;ll never need to worry about the bread becoming silently corrupted again
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html" rel="nofollow">Puffy in the cloud</a></h3>

<ul>
<li>If you&#39;ve ever wanted to set up a backup server, especially for family members or someone who&#39;s not as technology-savvy, you&#39;ve probably realized there are a lot of options</li>
<li>This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon</li>
<li>Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc</li>
<li>He also mentions <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">our pf tutorial</a> being helpful in blocking script kiddies from hammering the box</li>
<li>Be sure to encourage your less-technical friends to always back up their important data
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/asiabsdcon_2015" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo</li>
<li>It includes a wrap-up of the event, as well as a <a href="https://www.netbsd.org/gallery/presentations/#asiabsdcon2015" rel="nofollow">list of presentations</a> that NetBSD developers gave</li>
<li>Have you ever wanted even more pictures of NetBSD running on lots of devices? There&#39;s a never-ending supply, apparently</li>
<li>At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded <a href="http://www.ki.nu/%7Emakoto/p15/20150315/" rel="nofollow">pictures of all of them</a></li>
<li>There&#39;s also <a href="https://www.youtube.com/watch?v=K1y9cdmLFjw" rel="nofollow">a video</a> of an OMRON LUNA-II running the luna68k port
***</li>
</ul>

<h2>Interview - Kamila Součková - <a href="mailto:kamila@ksp.sk" rel="nofollow">kamila@ksp.sk</a> / <a href="https://twitter.com/anotherkamila" rel="nofollow">@anotherkamila</a></h2>

<p>BSD conferences, Google Summer of Code, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2015marchupdate.pdf" rel="nofollow">FreeBSD foundation March update</a></h3>

<ul>
<li>The FreeBSD foundation has published their March update for fundraising and sponsored projects</li>
<li>In the document, you&#39;ll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update</li>
<li>They also mention <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">our interview with the foundation president</a> - be sure to check it out if you haven&#39;t
***</li>
</ul>

<h3><a href="http://sdtimes.com/inside-openbsds-new-httpd-web-server/" rel="nofollow">Inside OpenBSD&#39;s new httpd</a></h3>

<ul>
<li>BSD news continues to <strong>dominate</strong> mainstream tech news sites… well <em>not really</em>, but they talk about it once in a while</li>
<li>The SD Times is featuring an article about OpenBSD&#39;s in-house HTTP server, after seeing Reyk&#39;s <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">AsiaBSDCon presentation</a> about it (which he&#39;s giving at BSDCan this year, too)</li>
<li>In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter</li>
<li>Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in</li>
<li>The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html" rel="nofollow">Using poudriere without OpenSSL</a></h3>

<ul>
<li>Last week we <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">talked about</a> using LibreSSL in FreeBSD for all your ports</li>
<li>One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to</li>
<li>This blog post shows how to completely strip OpenSSL out of the <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> build jails, something that&#39;s a lot more difficult than you&#39;d think</li>
<li>If you&#39;re a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142755452428573&w=2" rel="nofollow">HAMMER and GPT in OpenBSD</a></h3>

<ul>
<li>Someone, presumably a Google Summer of Code student, wrote in to the lists about his <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">HAMMER FS</a> porting proposal</li>
<li>He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)</li>
<li>There&#39;s no word yet on if it will be accepted, but it&#39;s an interesting idea to explore, especially when you consider that HAMMER really only has one developer</li>
<li>In more disk-related news, <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">Ken Westerback</a> has been committing quite a lot of <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=gpt&q=b" rel="nofollow">GPT-related fixes</a> recently</li>
<li>Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone&#39;s guess
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20e30p4qf" rel="nofollow">Morgan writes in</a></li>
<li><a href="http://slexy.org/view/s20clKByMP" rel="nofollow">Dustin writes in</a></li>
<li><a href="http://slexy.org/view/s20aBlmaT5" rel="nofollow">Stan writes in</a></li>
<li><a href="http://slexy.org/view/s2ufFrZY9y" rel="nofollow">Mica writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html" rel="nofollow">Developers in freefall</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142786808725483&w=4" rel="nofollow">Xorg thieves pt. 1</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142790740405547&w=4" rel="nofollow">Xorg thieves pt. 2</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>72: Common *Sense Approach</title>
  <link>https://www.bsdnow.tv/72</link>
  <guid isPermaLink="false">efe89103-4a81-4974-89f3-cb650975dace</guid>
  <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/efe89103-4a81-4974-89f3-cb650975dace.mp3" length="57654580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Be your own VPN provider with OpenBSD (http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html)
We've covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don't trust any VPN company?
It's easy for anyone to say "of course we don't run a modified version of OpenVPN that logs all your traffic... what are you talking about?"
The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk
With this guide, you'll be able to cut out the middleman and create your own VPN, using OpenBSD
It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***
FreeBSD vs Gentoo comparison (http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/)
People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software
This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems
The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things
If you're a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***
Kernel W^X in OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2)
W^X, "Write XOR Execute (https://en.wikipedia.org/wiki/W%5EX)," is a security feature of OpenBSD with a rather strange-looking name
It's meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time
This helps prevent some types of buffer overflows: code injected into it won't execute, but will crash the program (quite obviously the lesser of the two evils)
Through some recent work, OpenBSD's kernel now has no part of the address space without this feature - whereas it was only enabled in the userland previously (http://www.openbsd.org/papers/ru13-deraadt/)
Doing this incorrectly in the kernel could lead to far worse consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that's been in the works for a while
More technical details can be found in some recent CVS commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141917924602780&amp;amp;w=2)
***
Building an IPFW-based router (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/)
We've covered building routers with PF (http://www.bsdnow.tv/tutorials/openbsd-router) many times before, but what about IPFW (https://www.freebsd.org/doc/handbook/firewalls-ipfw.html)?
A certain host of a certain podcast decided it was finally time to replace his disappointing (https://github.com/jduck/asus-cmd) consumer router with something BSD-based
In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall
He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit
If you're an IPFW fan and are thinking about putting together a new router, give this post a read
***
Interview - Jos Schellevis - project@opnsense.org (mailto:project@opnsense.org) / @opnsense (https://twitter.com/opnsense)
The birth of OPNsense (http://opnsense.org)
News Roundup
On profiling HTTP (http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html)
Adrian Chadd, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan), has been doing some more ultra-high performance testing
Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools
According to him, it's "not very pretty"
He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process
You can check out his new code on Github (https://github.com/erikarn/libevhtp-http/) right now
***
Using divert(4) to reduce attacks (http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&amp;amp;t=8846)
We talked about using divert(4) (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4) with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)
It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you're running
PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won't work
The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious
Consider setting this up to reduce the attack spam in your logs if you run public services
***
ChaCha20 patchset for GELI (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html)
A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the disk encryption (http://www.bsdnow.tv/tutorials/fde) system
There are also some benchmarks that look pretty good in terms of performance
Currently, GELI defaults to AES in XTS mode (https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29) with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)
There's some discussion (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html) going on about whether a stream cipher (https://en.wikipedia.org/wiki/Stream_cipher) is suitable or not (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html) for disk encryption though, so this might not be a match made in heaven just yet
***
PCBSD update system enhancements (http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/)
The PCBSD update utility has gotten an update itself, now supporting automatic upgrades
You can choose what parts of your system you want to let it automatically handle (packages, security updates)
The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality
There's also a new graphical frontend available for it
***
Feedback/Questions
Mat writes in (http://slexy.org/view/s2XJhAsffU)
Chris writes in (http://slexy.org/view/s20qnSHujZ)
Andy writes in (http://slexy.org/view/s21O0MShqi)
Beau writes in (http://slexy.org/view/s2LutVQOXN) 
Kutay writes in (http://slexy.org/view/s21Esexdrc)
***
Mailing List Gold
Wait, a real one? (https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html)
What's that glowing... (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142125454022458&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, opnsense, pfsense, m0n0wall, firewall, gateway, router, php, fork, deciso, netgate, portage, owncloud, soekris, apu, pcengines, alix, vpn, ipfw</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>61: IPSECond Wind</title>
  <link>https://www.bsdnow.tv/61</link>
  <guid isPermaLink="false">a0bfab13-8167-4b68-b1de-74122013593a</guid>
  <pubDate>Wed, 29 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0bfab13-8167-4b68-b1de-74122013593a.mp3" length="53960980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD panel at Phoenix LUG (https://www.youtube.com/watch?v=3AOF7fm-TJ0)
The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD
It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience
They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy
It was a good "real world" example of things potential switchers are curious to know about
They closed by concluding that more diversity is always better, and even if you've got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***
Book of PF signed copy auction (http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html)
Peter Hansteen (who we've had on the show (http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall)) is auctioning off the first signed copy of the new Book of PF
All the profits from the sale will go to the OpenBSD Foundation (http://www.openbsd.org/donations.html)
The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD's versions (which still use ALTQ, among other differences)
If you're interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause
Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) has challenged Peter (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141429413908567&amp;amp;w=2) to raise more for the foundation than his last book selling - let's see who wins
Pause the episode, go bid on it (http://www.ebay.com/itm/321563281902) and then come back!
***
FreeBSD Foundation goes to EuroBSDCon (http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html)
Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report
They also sponsored four other developers to go
The foundation was there "to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD"
They also have a second report (http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html) from Kamil Czekirda
A total of $2000 was raised at the conference
***
OpenBSD 5.6 released (http://www.openbsd.org/56.html)
Note: we're doing this story a couple days early - it's actually being released on November 1st (this Saturday), but we have next week off and didn't want to let this one slip through the cracks - it may be out by the time you're watching this
Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6
It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features
5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it
You can now hibernate your laptop when using a fully-encrypted filesystem (see our tutorial (http://www.bsdnow.tv/tutorials/fde) for that)
ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed
This will serve as a "transitional" release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to httpd (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) and from BIND to Unbound
Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions
As always, 5.6 comes with its own song and artwork (http://www.openbsd.org/lyrics.html#56) - the theme this time was obviously LibreSSL
Be sure to check the full changelog (http://www.openbsd.org/plus56.html) (it's huge) and pick up a CD or tshirt (http://www.openbsd.org/orders.html) to support their efforts
If you don't already have the public key releases are signed with, getting a physical CD is a good "out of bounds" way to obtain it safely
Here are some cool images of the set (https://imgur.com/a/5PtFe)
After you do your installation or upgrade (http://www.openbsd.org/faq/upgrade56.html), don't forget to head over to the errata page (http://www.openbsd.org/errata56.html) and apply any patches listed there
***
Interview - John-Mark Gurney - jmg@freebsd.org (mailto:jmg@freebsd.org) / @encthenet (https://twitter.com/encthenet)
Updating FreeBSD's IPSEC stack
News Roundup
Clang in DragonFly BSD (https://www.dragonflydigest.com/2014/10/22/14942.html)
As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64
Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly
We'd love to see more BSDs switch to Clang/LLVM eventually, it's a lot more modern than the old GCC most are using
***
reallocarray(): integer overflow detection for free (http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/)
One of the less obvious features in OpenBSD 5.6 is a new libc function: "reallocarray()"
It's a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost
Theo and a few other developers have already started (https://secure.freshbsd.org/search?project=openbsd&amp;amp;q=reallocarray) a mass audit of the entire source tree, replacing many instances with this new feature
OpenBSD's explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***
Switching from Linux blog (http://bothsidesofthence.tumblr.com/)
A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux
After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)
So far, he's put up a few posts about his initial thoughts, some documentation he's going through and his experiments so far
It'll be an ongoing series, so we may check back in with him again later on
***
Owncloud in a FreeNAS jail (https://www.youtube.com/watch?v=z6VQwOl4wE4)
One of the most common emails we get is about running Owncloud in FreeNAS
Now, finally, someone made a video on how to do just that, and it's even jailed
A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend
If you're looking for an easy way to back up and sync your files, this might be worth a watch
***
Feedback/Questions
Ernõ writes in (http://slexy.org/view/s2XEsQdggZ)
David writes in (http://slexy.org/view/s21EizH2aR)
Kamil writes in (http://slexy.org/view/s24SAJ5im6)
Torsten writes in (http://slexy.org/view/s20ABZe0RD)
Dominik writes in (http://slexy.org/view/s208jQs9c6)
***
Mailing List Gold
That's not our IP (https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html)
Is this thing on? (https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ipsec, aes, gcm, chacha20, encryption, netsec, ike, openiked, infosec, 5.6, openhttpd, opensmtpd, meetbsd, book of pf, libressl, freenas, owncloud</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>40: AirPorts &amp; Packages</title>
  <link>https://www.bsdnow.tv/40</link>
  <guid isPermaLink="false">f9c8a284-4fd9-4c5d-9137-77062c5814b4</guid>
  <pubDate>Wed, 04 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f9c8a284-4fd9-4c5d-9137-77062c5814b4.mp3" length="52844692" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2014 talks and reports, part 2 (https://www.bsdcan.org/2014/schedule/)
More presentations and trip reports are still being uploaded
Ingo Schwarze, New Trends in mandoc (https://www.youtube.com/watch?v=oifYhwTaOuw)
Vsevolod Stakhov, The Architecture of the New Solver in pkg
 (https://www.youtube.com/watch?v=3SOKFz2UUQ4)
Julio Merino, The FreeBSD Test Suite (https://www.youtube.com/watch?v=nf-bFeKaZsY)
Zbigniew Bodek, Transparent Superpages for FreeBSD on ARM (https://www.youtube.com/watch?v=s5iIKEHtbX8)
There's also a trip report from Michael Dexter (http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html) and another (very long and detailed) trip report (http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html) from our friend Warren Block (http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king) that even gives us some linkage, thanks!
***
Beyond security, getting to know OpenBSD's real purpose (https://www.youtube.com/watch?v=JrFfrrY-yOo)
Michael W Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) (who, we learn through this video, has been using BSD since 1986) gave a "webcast" last week, and the audio and slides are finally up
It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics
Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a "pressure cooker for ideas," briefly touches on GPL vs BSDL, their "do it right or don't do it at all" attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans
Here's a direct link to the slides (https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf)
Great presentation if you'd like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***
FreeBSD vs Linux, a comprehensive comparison (http://brioteam.com/linux-versus-freebsd-comprehensive-comparison)
Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux
This one was worth mentioning because it's very thorough in regards to how things are done behind the scenes, not just the usual technical differences
It highlights the concept of a "core team" and their role vs "contributors" and "committers" (similar to a presentation Kirk McKusick did not long ago)
While a lot of things will be the same on both platforms, you might still be asking "which one is right for me?" - this article weighs in with some points for both sides and different use cases
Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don't hate us for linking it
***
Expand FreeNAS with plugins (http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins)
One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework
With these plugins, you can greatly expand the feature set of your NAS via third party programs
This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience
Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more
It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***
Interview - Karl Lehenbauer - karl@flightaware.com (mailto:karl@flightaware.com) / @flightaware (https://twitter.com/flightaware)
FreeBSD at FlightAware, BSD history, various topics
Tutorial
Ports and packages in OpenBSD (http://www.bsdnow.tv/tutorials/ports-obsd)
News Roundup
Code review culture meets FreeBSD (http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html)
In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree
This article describes Phabricator, an open source code review system that we briefly mentioned last week
Instructions for using it are on the wiki (https://wiki.freebsd.org/CodeReview)
While not approved by the core team yet for anything official, it's in a testing phase and developers are encouraged to try it out and get their patches reviewed
Just look at that fancy interface!! (http://phabric.freebsd.org/)
***
Upcoming BSD books (http://blather.michaelwlucas.com/archives/2088)
Sneaky MWL somehow finds his way into both our headlines and the news roundup
He gives us an update on the next BSD books that he's planning to release
The plan is to release three (or so) books based on different aspects of FreeBSD's storage system(s) - GEOM, UFS, ZFS, etc.
This has the advantage of only requiring you to buy the one(s) you're specifically interested in
"When will they be released? When I'm done writing them. How much will they cost? Dunno."
It's not Absolute FreeBSD 3rd edition...
***
CARP failover and high availability on FreeBSD (https://www.youtube.com/watch?v=VjYb9mKB4jU)
If you're running a cluster or a group of servers, you should have some sort of failover in place
But the question comes up, "how do you load balance the load balancers!?"
This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying
Also mentions DNS-based load balancing as another option
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/)
This time in PCBSD land, we're getting ready for the 10.0.2 release (ISOs here) (http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/)
AppCafe got a good number of fixes, and now shows 10 random highlighted applications
EasyPBI added a "bulk" mode to create PBIs of an entire FreeBSD port category
Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***
Feedback/Questions
Paul writes in (http://slexy.org/view/s205iiKiWp)
Matt writes in (http://slexy.org/view/s2060bkTNl)
Kjell writes in (http://slexy.org/view/s2G7eMC6oP)
Paul writes in (http://slexy.org/view/s2REfzMFGK)
Tom writes in (http://slexy.org/view/s21nvJtXY6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, flightaware, karl lehenbauer, keynote, bsdcan, 2014, webcast, beyond security, libressl, linux, bsd vs linux, freenas, plugins, jails, plex media server, plex, owncloud, tarsnap, ixsystems, code review, kyua, geom, ufs, zfs, books, absolute freebsd, carp, failover, high availability, firewalls, pf, ipfw, load balancing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
